Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
thunderbird-to-outlook-converter.exe

Overview

General Information

Sample name:thunderbird-to-outlook-converter.exe
Analysis ID:1545749
MD5:ed6c1f0e4bc19623cbbad48cf84ab099
SHA1:ea54f4b7f52c6948c102d452a615671738427bce
SHA256:28923cdeb17db6f79d0f7c134daa9343cb99253921c1f4054d201b1e242305ca
Infos:

Detection

Score:36
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:32
Range:0 - 100

Signatures

.NET source code contains potential unpacker
Yara detected Generic Downloader
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • thunderbird-to-outlook-converter.exe (PID: 6604 cmdline: "C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe" MD5: ED6C1F0E4BC19623CBBAD48CF84AB099)
    • msiexec.exe (PID: 6700 cmdline: msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSIF618.tmp MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 736 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5812 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 7290A6845925C195E7014D9F7E4EB858 C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 1368 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding C3F8760112445D68E9871B76E5B0FA05 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLLJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_853F67D554F05449430E7E.exeJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeEXE: msiexec.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_039DBA7754DFCAABD648C2.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_59A44D4F4928D847AB3E43.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_1ABCAD378361F678050DB6.exeJump to behavior

    Compliance

    barindex
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_853F67D554F05449430E7E.exeJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeEXE: msiexec.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_039DBA7754DFCAABD648C2.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_59A44D4F4928D847AB3E43.exeJump to behavior
    Source: C:\Windows\System32\msiexec.exeEXE: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_1ABCAD378361F678050DB6.exeJump to behavior
    Source: thunderbird-to-outlook-converter.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\License Agreement.rtfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\License Agreement.rtfJump to behavior
    Source: thunderbird-to-outlook-converter.exeStatic PE information: certificate valid
    Source: Binary string: F:\gs1\VS\out\binaries\x86ret\bin\i386\DPCA.pdb source: thunderbird-to-outlook-converter.exe, MSI36CB.tmp.2.dr, MSI3739.tmp.2.dr, 5d34b7.msi.2.dr, MSIF618.tmp.0.dr, 5d34b9.msi.2.dr, MSIF8D8.tmp.1.dr, MSIF85A.tmp.1.dr
    Source: Binary string: e:\Develope\msi2exe\release\msi2exestub.pdb source: thunderbird-to-outlook-converter.exe
    Source: Binary string: F:\gs1\VS\out\binaries\x86ret\bin\i386\DPCA.pdb? source: thunderbird-to-outlook-converter.exe, MSI36CB.tmp.2.dr, MSI3739.tmp.2.dr, 5d34b7.msi.2.dr, MSIF618.tmp.0.dr, 5d34b9.msi.2.dr, MSIF8D8.tmp.1.dr, MSIF85A.tmp.1.dr
    Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}Jump to behavior

    Networking

    barindex
    Source: Yara matchFile source: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLL, type: DROPPED
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://certificates.godaddy.com/repository/0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://certs.godaddy.com/repository/1301
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://certs.starfieldtech.com/repository/1402
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.godaddy.com/gdig2s5-5.crl0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.starfieldtech.com/repository/0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.starfieldtech.com/repository/masterstarfield2issuing.crl0P
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.starfieldtech.com/repository/sf_issuing_ca-g2.crt0T
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://crl.starfieldtech.com/sfroot-g2.crl0L
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://ocsp.comodoca.com0
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://ocsp.godaddy.com/0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://ocsp.godaddy.com/05
    Source: Aspose.Email.DLL.2.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://ocsp.starfieldtech.com/0;
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: http://ocsp.starfieldtech.com/0H
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://ocsp.thawte.com0
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: TreeksLicensingLibrary2.DLL.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: https://certs.godaddy.com/repository/0
    Source: thunderbird-to-outlook-converter.exeString found in binary or memory: https://certs.starfieldtech.com/repository/0
    Source: MailsdaddyThunderbirdToOutlookConverter.exe.2.drString found in binary or memory: https://purchase.aspose.com/policies/use-license
    Source: Aspose.Email.DLL.2.drString found in binary or memory: https://sectigo.com/CPS0D
    Source: Aspose.Email.DLL.2.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d34b7.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI36CB.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3739.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}Jump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI37A7.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d34b9.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5d34b9.msiJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI36CB.tmpJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00404C680_2_00404C68
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00402F700_2_00402F70
    Source: thunderbird-to-outlook-converter.exeBinary or memory string: OriginalFilename vs thunderbird-to-outlook-converter.exe
    Source: thunderbird-to-outlook-converter.exe, 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDPCA.DLLT vs thunderbird-to-outlook-converter.exe
    Source: thunderbird-to-outlook-converter.exeBinary or memory string: OriginalFilenameDPCA.DLLT vs thunderbird-to-outlook-converter.exe
    Source: thunderbird-to-outlook-converter.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: TreeksLicensingLibrary2.DLL.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: sus36.troj.evad.winEXE@8/40@0/0
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_0040134E __EH_prolog3_catch,_memset,_memset,GetTempPathW,GetTempFileNameW,__CxxThrowException@8,FindResourceW,SizeofResource,LoadResource,LockResource,CreateFileW,ShowWindow,ShowWindow,WriteFile,InvalidateRect,ShowWindow,CloseHandle,_swprintf,_memset,CreateProcessW,ExitProcess,0_2_0040134E
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) LtdJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CML3822.tmpJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF618.tmpJump to behavior
    Source: thunderbird-to-outlook-converter.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\msiexec.exeFile read: C:\Windows\win.iniJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe "C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe"
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSIF618.tmp
    Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7290A6845925C195E7014D9F7E4EB858 C
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding C3F8760112445D68E9871B76E5B0FA05
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSIF618.tmpJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 7290A6845925C195E7014D9F7E4EB858 CJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding C3F8760112445D68E9871B76E5B0FA05Jump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msihnd.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
    Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
    Source: Mailsdaddy Thunderbird To Outlook Converter.lnk.2.drLNK file: ..\..\..\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_039DBA7754DFCAABD648C2.exe
    Source: Mailsdaddy Thunderbird To Outlook Converter.lnk0.2.drLNK file: ..\..\..\..\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_59A44D4F4928D847AB3E43.exe
    Source: Mailsdaddy Thunderbird To Outlook Converter.lnk1.2.drLNK file: ..\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}\_1ABCAD378361F678050DB6.exe
    Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
    Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
    Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: I Agree
    Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
    Source: C:\Windows\SysWOW64\msiexec.exeAutomated click: Next >
    Source: thunderbird-to-outlook-converter.exeStatic PE information: certificate valid
    Source: thunderbird-to-outlook-converter.exeStatic file information: File size 8612560 > 1048576
    Source: thunderbird-to-outlook-converter.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x825000
    Source: thunderbird-to-outlook-converter.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: F:\gs1\VS\out\binaries\x86ret\bin\i386\DPCA.pdb source: thunderbird-to-outlook-converter.exe, MSI36CB.tmp.2.dr, MSI3739.tmp.2.dr, 5d34b7.msi.2.dr, MSIF618.tmp.0.dr, 5d34b9.msi.2.dr, MSIF8D8.tmp.1.dr, MSIF85A.tmp.1.dr
    Source: Binary string: e:\Develope\msi2exe\release\msi2exestub.pdb source: thunderbird-to-outlook-converter.exe
    Source: Binary string: F:\gs1\VS\out\binaries\x86ret\bin\i386\DPCA.pdb? source: thunderbird-to-outlook-converter.exe, MSI36CB.tmp.2.dr, MSI3739.tmp.2.dr, 5d34b7.msi.2.dr, MSIF618.tmp.0.dr, 5d34b9.msi.2.dr, MSIF8D8.tmp.1.dr, MSIF85A.tmp.1.dr

    Data Obfuscation

    barindex
    Source: TreeksLicensingLibrary2.DLL.2.dr, --.cs.Net Code: _0002 System.Reflection.Assembly.Load(byte[])
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_004065BA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_004065BA
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00402F51 push ecx; ret 0_2_00402F64
    Source: TreeksLicensingLibrary2.DLL.2.drStatic PE information: section name: .text entropy: 7.909684201630082
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\MailsdaddyThunderbirdToOutlookConverter.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI36CB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3739.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\Aspose.Email.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF8D8.tmpJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIF85A.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI36CB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI3739.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\License Agreement.rtfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\License Agreement.rtfJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MailsDaddyJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MailsDaddy\Mailsdaddy Thunderbird To Outlook Converter.lnkJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\MailsdaddyThunderbirdToOutlookConverter.exeJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI36CB.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI3739.tmpJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLLJump to dropped file
    Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\Aspose.Email.DLLJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF8D8.tmpJump to dropped file
    Source: C:\Windows\SysWOW64\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIF85A.tmpJump to dropped file
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-2146
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\userJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\InstallerJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppDataJump to behavior
    Source: C:\Windows\System32\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Installer\{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}Jump to behavior
    Source: Aspose.Email.DLL.2.drBinary or memory string: #=zGCaIGGoy1$NUKmG_CsftXG5sKlnzNzvmCIEDug0mz3qn
    Source: Aspose.Email.DLL.2.drBinary or memory string: #=z5_Nge9eohgfsrfkPRCICQG$IG0R7
    Source: Aspose.Email.DLL.2.drBinary or memory string: #=zoIn7JTGecCpYn2AbMCMTDb_46$hGFSZ5oQ==
    Source: Aspose.Email.DLL.2.drBinary or memory string: #=zi0jHgfsah8Ev
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeAPI call chain: ExitProcess graph end nodegraph_0-2159
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeAPI call chain: ExitProcess graph end nodegraph_0-2147
    Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00401A49 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401A49
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_004065BA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_004065BA
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00401A49 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401A49
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_0040214A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040214A
    Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\thunderbird-to-outlook-converter.exeCode function: 0_2_00404A38 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00404A38
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    2
    Native API
    1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    22
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Registry Run Keys / Startup Folder
    1
    Process Injection
    LSASS Memory11
    Security Software Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Search Order Hijacking
    1
    DLL Side-Loading
    2
    Obfuscated Files or Information
    Security Account Manager1
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Search Order Hijacking
    12
    Software Packing
    NTDS11
    Peripheral Device Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets2
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Search Order Hijacking
    Cached Domain Credentials13
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    File Deletion
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1545749 Sample: thunderbird-to-outlook-conv... Startdate: 30/10/2024 Architecture: WINDOWS Score: 36 30 .NET source code contains potential unpacker 2->30 32 Yara detected Generic Downloader 2->32 6 msiexec.exe 121 65 2->6         started        9 thunderbird-to-outlook-converter.exe 1 2->9         started        process3 file4 18 C:\...\TreeksLicensingLibrary2.DLL, PE32 6->18 dropped 20 C:\Windows\Installer\MSI3739.tmp, PE32 6->20 dropped 22 C:\Windows\Installer\MSI36CB.tmp, PE32 6->22 dropped 24 2 other files (none is malicious) 6->24 dropped 11 msiexec.exe 89 1 6->11         started        13 msiexec.exe 1 6->13         started        15 msiexec.exe 5 9->15         started        process5 file6 26 C:\Users\user\AppData\Local\...\MSIF8D8.tmp, PE32 15->26 dropped 28 C:\Users\user\AppData\Local\...\MSIF85A.tmp, PE32 15->28 dropped

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    thunderbird-to-outlook-converter.exe0%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\Aspose.Email.DLL0%ReversingLabs
    C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\MailsdaddyThunderbirdToOutlookConverter.exe4%ReversingLabs
    C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLL2%ReversingLabs
    C:\Users\user\AppData\Local\Temp\MSIF85A.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\MSIF8D8.tmp0%ReversingLabs
    C:\Windows\Installer\MSI36CB.tmp0%ReversingLabs
    C:\Windows\Installer\MSI3739.tmp0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
    http://ocsp.thawte.com00%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.godaddy.com/gdroot-g2.crl0Fthunderbird-to-outlook-converter.exefalse
      unknown
      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tAspose.Email.DLL.2.drfalse
      • URL Reputation: safe
      unknown
      http://ocsp.starfieldtech.com/0Hthunderbird-to-outlook-converter.exefalse
        unknown
        http://crl.starfieldtech.com/repository/0thunderbird-to-outlook-converter.exefalse
          unknown
          http://crl.starfieldtech.com/repository/masterstarfield2issuing.crl0Pthunderbird-to-outlook-converter.exefalse
            unknown
            http://crl.thawte.com/ThawteTimestampingCA.crl0TreeksLicensingLibrary2.DLL.2.drfalse
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com0Aspose.Email.DLL.2.drfalse
            • URL Reputation: safe
            unknown
            https://certs.starfieldtech.com/repository/0thunderbird-to-outlook-converter.exefalse
              unknown
              http://certificates.godaddy.com/repository/0thunderbird-to-outlook-converter.exefalse
                unknown
                http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Aspose.Email.DLL.2.drfalse
                • URL Reputation: safe
                unknown
                http://certs.starfieldtech.com/repository/1402thunderbird-to-outlook-converter.exefalse
                  unknown
                  http://crl.starfieldtech.com/sfroot-g2.crl0Lthunderbird-to-outlook-converter.exefalse
                    unknown
                    http://ocsp.thawte.com0TreeksLicensingLibrary2.DLL.2.drfalse
                    • URL Reputation: safe
                    unknown
                    http://certs.godaddy.com/repository/1301thunderbird-to-outlook-converter.exefalse
                      unknown
                      https://sectigo.com/CPS0DAspose.Email.DLL.2.drfalse
                        unknown
                        http://crl.godaddy.com/gdig2s5-5.crl0thunderbird-to-outlook-converter.exefalse
                          unknown
                          http://crl.starfieldtech.com/repository/sf_issuing_ca-g2.crt0Tthunderbird-to-outlook-converter.exefalse
                            unknown
                            http://ocsp.starfieldtech.com/0;thunderbird-to-outlook-converter.exefalse
                              unknown
                              https://certs.godaddy.com/repository/0thunderbird-to-outlook-converter.exefalse
                                unknown
                                http://certificates.godaddy.com/repository/gdig2.crt0thunderbird-to-outlook-converter.exefalse
                                  unknown
                                  https://purchase.aspose.com/policies/use-licenseMailsdaddyThunderbirdToOutlookConverter.exe.2.drfalse
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1545749
                                    Start date and time:2024-10-30 22:55:55 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 9s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:thunderbird-to-outlook-converter.exe
                                    Detection:SUS
                                    Classification:sus36.troj.evad.winEXE@8/40@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • VT rate limit hit for: thunderbird-to-outlook-converter.exe
                                    No simulations
                                    No context
                                    No context
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\MSIF85A.tmpUTSetup.msiGet hashmaliciousUnknownBrowse
                                      ICE_Auto_Setup1.3signed.exeGet hashmaliciousUnknownBrowse
                                        ICE_Auto_Setup1.3signed.exeGet hashmaliciousUnknownBrowse
                                          Setupfr.msiGet hashmaliciousUnknownBrowse
                                            C:\Users\user\AppData\Local\Temp\MSIF8D8.tmpUTSetup.msiGet hashmaliciousUnknownBrowse
                                              ICE_Auto_Setup1.3signed.exeGet hashmaliciousUnknownBrowse
                                                ICE_Auto_Setup1.3signed.exeGet hashmaliciousUnknownBrowse
                                                  Setupfr.msiGet hashmaliciousUnknownBrowse
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):18100
                                                    Entropy (8bit):5.793248747965284
                                                    Encrypted:false
                                                    SSDEEP:192:yeIS8ReET1ZsZDO9a4CPEaXV/eN+0gqfXI7fXxlh27m43Wpj7:yex0eET1ZsZDO9VCPEa+fkfhIw7
                                                    MD5:B6101A7F00764E9593DB073F0DD47013
                                                    SHA1:72097776F7196AE51995CD4E0504A204F9FA8949
                                                    SHA-256:DEC8B6F52BF542AF1671535B26BC14A0B02638C9C90B40502DDB63BCE35767A0
                                                    SHA-512:84A7A11402F31B70C0951F4BA784EC649D3C468EBB4E58990A65A3790E4667AF18C91F2D1034ABC42598576F949C8996F11C6E92ED755932DB88E9BA51A3031B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...@IXOS.@.....@$.^Y.@.....@.....@.....@.....@.....@......&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}+.MailsDaddy Thunderbird to Outlook Converter..MSIF618.tmp.@.....@.....@.....@......_853F67D554F05449430E7E.exe..&.{A232982E-298B-41EA-93F1-4F055FADF244}.....@.....@.....@.....@.......@.....@.....@.......@....+.MailsDaddy Thunderbird to Outlook Converter......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{D98F3635-E5A6-E697-8AEA-FF9A58963D52}&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}.@......&.{D8237FD1-DE18-5DC1-0EC9-35347546BBF7}&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}.@......&.{06856F88-F013-FCFE-B98E-FDE3FF5B6CA6}&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}.@......&.{325BB016-F14B-FDB3-C4FB-A0F8035BB9B8}&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}.@......&.{1726AEA8-C667-60A0-49C4-33100DCDA45B}&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}.@......&.{5BF9B5B7-EB23-661A-5842-A9681649CFCD}&.{7A41F43B-6BBA-41C
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):8361128
                                                    Entropy (8bit):6.4686495954120815
                                                    Encrypted:false
                                                    SSDEEP:49152:Lc+Rj4xCbeoC87zWh6PoW0HhYMvoL1IVatbyhtrSYJLcF+sOVD1s4/PADnflQz/B:Lc+RjBHWh6QHhYYcWISL6OVDBPEjc
                                                    MD5:7AA8C8CCC671A094EBCD0FB12CF15329
                                                    SHA1:3BE9BCCAAC4923E0922B13212EEAF977BD075DA1
                                                    SHA-256:05D51AD015EB7492A5D1FD1D506C4D4C587A926D8C9D9A2D40ABE4EB89185276
                                                    SHA-512:159890986E72C37E38179DB5D4BD8603AB989CBCF4BC18D3DCFF2BC2D177CF889E9ACF0C83CAF900F30535CB831FFE684936A94C8F8014A8B5C46E7B64B30170
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...(.V^...........!.....j............... ........@.. ..............................C.....@.....................................W....................t... ........................................................... ............... ..H............text....i... ...j.................. ..`.rsrc................l..............@..@.reloc...............r..............@..B........................H........)G..^8.........0C;.(...X)G......................................0...........-..-.+.(....+.(....+.*..0.............-.&..(....+.&+.*..0...........(.......-.&&+.}....+.*..0.............-.&{....+.&+.*....0.............-.&&+.}....+.*....0.............-.&(.........+.&+.*...0..i........u....,.........-.&&+.(....+.*.u....,........j.,.&&+.(....+.*.u....,........j.-.&&+.(....+.*..(....(....*....0..0.......s....%...-.&{....o....%...-.&(....o....+.&+.&+.*.0&...........o.....:|..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Rich Text Format data, version 1, ANSI, code page 1252, default middle east language ID 1025
                                                    Category:dropped
                                                    Size (bytes):46173
                                                    Entropy (8bit):5.074058089289603
                                                    Encrypted:false
                                                    SSDEEP:384:VNgyfWWLFKrN7DozVzEFepdMua9qwwqMQCqpCi6rGs+ZAUw5PTsxCYDnMNLDp:VNgyfbBpdQ9qwwqhCqjqUisx+NLDp
                                                    MD5:014F3513951BBBE0B419C193402C39D8
                                                    SHA1:32E322ECBCC3F3D280A7225C3D3B0170CBC3BF95
                                                    SHA-256:71B60F9C8D440BBD012636850A4499A3F7DA4756A03A4AF145AE525E3245D1BC
                                                    SHA-512:C2693C0F723C5CE96C95C17F7EE3CF519A236E478CA902E72722A77E08155A816C713E6E446943AC33CED643B9AB3686C3B8E64EB78D73A5D4D254BA623A108A
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch0\stshfloch31506\stshfhich31506\stshfbi31506\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset0\fprq2{\*\panose 02040503050406030204}Cambria Math;}..{\f37\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0502020204030204}Calibri;}{\f39\fbidi \fswiss\fcharset0\fprq2{\*\panose 00000000000000000000}Verdana;}{\flomajor\f31500\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2{\*\panose 020f0302020204030204}Calibri Light;}..{\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}..{\fdbminor\f3150
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                    Category:dropped
                                                    Size (bytes):3219
                                                    Entropy (8bit):3.0246305641353337
                                                    Encrypted:false
                                                    SSDEEP:48:8FTU6IuPSpIZQIHMIZjdYwQW6IHMIZAl3wvdu1tHMIZ:8FUaSpIZHHMIZzZHMIZkgvcHHMIZ
                                                    MD5:7B5AB87556D7F1F2E5EF26EB44E574A1
                                                    SHA1:6021EECB40938030A076904CCFE068F4C59EFAAC
                                                    SHA-256:1338FA7549794061124241439CBF34D471DDEEFAC72F000804FC753B232EBD91
                                                    SHA-512:A6B27EB645A1AF52D2D887A9AEC4D15A90209A0C526BDBB7E1671BCB31EF56F009848EA4E3C62AD05A151E8306E936D5556C65F735C47D6956160C040BC14F1B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:L..................F.P......................................................u....P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH^Y......................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....^Y....user.<......CW.^^Y............................y.5.j.o.n.e.s.....V.1.....CW.^..AppData.@......CW.^^Y.............................%..A.p.p.D.a.t.a.....V.1.....^Y....Roaming.@......CW.^^Y..............................0.R.o.a.m.i.n.g.....\.1.....^Y$...MICROS~1..D......CW.^^Y$...........................;...M.i.c.r.o.s.o.f.t.....\.1.....^Y$...INSTAL~1..D......^Y$.^Y$.....D.....................>...I.n.s.t.a.l.l.e.r.......1.....^Y$...{7A41F~1..~......^Y$.^Y$.....I......................+..{.7.A.4.1.F.4.3.B.-.6.B.B.A.-.4.1.C.2.-.9.3.0.2.-.0.B.D.D.E.B.B.C.0.3.8.C.}.......2.&}..^Y$.!._039DB~1.EXE..h......^Y$.^Y$...........................>..._.0.3.9.D.B.A.7.7.5.4.D.F.C.A.A.B.D.6.4.8.C.2...e.x.e.......{.....\.....\.....\.U.s.e.r.s.\.j.o.n
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):5264896
                                                    Entropy (8bit):7.3434710418909965
                                                    Encrypted:false
                                                    SSDEEP:49152:c7xReUTjyuM/xReUTjyuM/ePpGxoN5ooovzdPj57T3jYkQDReUTjyuM/ZReUTjyA:c7rrGTrGmpGm5XcNRXQFrGLrG
                                                    MD5:0E8BBF4FFFA92BBF2D8FD00182C658A0
                                                    SHA1:DD469F71D0D8EB50B0E35987DD824ECB3FFEAB1A
                                                    SHA-256:12D71471EB9C102FED52E857B36947E6B0432896D587BF40DB836D1FAEC5BF15
                                                    SHA-512:76D1340638A679777F1B5C8D2CD498A3E1F4A9AD92DFB2BC9B17AB78AE424DA825DDE347282B8581630870FC5472E1600F2301F2E46B1A23496AAE6A95A6B5C7
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....p}_..................O..RP.....n.O.. ....P...@.. ........................P...............................................O.W.... P......................P...................................................... ............... ..H............text...t.O.. ....O................. ..`.reloc........P.......O.............@..B.rsrc....... P.......O.............@..@................P.O.....H........QO.(............O..h.M..........................................0...........,) ......+...o.....a ....Z...X...o..../.+..*..R..}.....(.....(....*....0..&........,..{.......+....,..{....o......(....*...0...............(....s......s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....s....}.....{....o ....{....o!....{....o ....( ....{....("...o#....{.....o$....
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):614096
                                                    Entropy (8bit):7.897350357149182
                                                    Encrypted:false
                                                    SSDEEP:12288:l8R9dd8EqZi2vJg8UqlMpD+v4YN/hV1ACV:CR9RR2BMp24S/1V
                                                    MD5:71406D8868500DB8154F225B96902E8F
                                                    SHA1:C417242856524807087B4B392A502DAC7899322D
                                                    SHA-256:5E9ED3B4A107908EDF7551985BD489333DE0895ED039E66B078E2DE1800A73FE
                                                    SHA-512:584E1AE09E47F030DE0FAE7AAC0BAF7C35DFF1347366F89B3D7D35B0106451DB26D4E0703D64D3B16DD727A01CFFEDB8B2F25EB579D346C55317D63435B4E992
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLL, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 2%
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zhV\...........!.....8...B......zW... ...`....@.. ...............................M...................................... W..W....................F.......`....................................................... ............... ..H............text....7... ...8.................. ..`.reloc.......`.......:..............@..B.rsrc................<..............@..@................\W......H.......h...................X............................................(....(....*..(..... .........}.....s....}......{......}....*...f.{.....{....o......}....*...0..>........{.....{......2..o.....{.....{....(.... ...._...{......}.....*...0...........o.....]*....0.."........./. /V.!(....s....z.......o.....*...0...........o......l#.......A[*6.{.....o....*....( .....%..!...s!...(".....}......}.....o....*..0..!........,..{....,..{....o#.......($....*.}..................0..$...
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):7548
                                                    Entropy (8bit):4.143571137228021
                                                    Encrypted:false
                                                    SSDEEP:96:V4t2aVjOg4izf3GW8n3tUh7V8W1qZK/v93lgJup:V4McJZPGW298SW4ZK/v93kup
                                                    MD5:70BA3CC095C1638CF9E8E87F236761FE
                                                    SHA1:9563D993A60E23763278FB95078D1A8ECD5765AF
                                                    SHA-256:E76E9E560F8D8D5FFB574027A2BF9C5753C4C913ECA37377FD35B6C1B277F7FE
                                                    SHA-512:95291CA391060D0FF8127CCAF301140E929E1E1FC3BFAEC15DBF34EA0D76B2D0A3EDE816BCA6FB6B23BEFD2CD8338174F675F96BBAF5C87ECA4C45652C63F9E1
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MSFT................A...................................$.......h... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................L...............d...8...........l...............t...................x...............................H...............................................................$...............t...........................................%!..|...............................................................................................%!..|.......................................H....................................... ...............%!..|.......................................`.......4...............................@...............%!..|.......................................x.......H...................$...........`...............%!..|...............................................`...................0...........................%!..|...............................................t...
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=4], baseline, precision 8, 497x69, components 3
                                                    Category:dropped
                                                    Size (bytes):8164
                                                    Entropy (8bit):7.537492701868835
                                                    Encrypted:false
                                                    SSDEEP:96:SnHF+N26MT0D5MdtbZPAVwzVeEufWdAJGj9hZo5Auf0ahoWv+O32CwHo+yy:UvYNMtKwsNVJehiiuBKWvpqHony
                                                    MD5:6E54CFEA2D19E91EF8C424B7F1E3F7E4
                                                    SHA1:7E5C9D6793B0C86349E662F8EAA46C782DA9AA4F
                                                    SHA-256:FEE72CA0E794BD078B8E5AE44F33878016FA07F555DAA66CF9D65E28B5DE3B21
                                                    SHA-512:B325FE6BD2AA233FF74A6762FB00A108F574EC400EC10871A62B730FA76A2B55365C543B9228346F8DF97C756F697B0CB3539FAB6616A48BF52D68411EA64DB5
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:......JFIF.....`.`.....\Exif..MM.*.................>Q...........Q...........Q...............Photoshop ICC profile....XICC_PROFILE......HLino....mntrRGB XYZ .........1..acspMSFT....IEC sRGB.......................-HP ................................................cprt...P...3desc.......lwtpt........bkpt........rXYZ........gXYZ...,....bXYZ...@....dmnd...T...pdmdd........vued...L....view.......$lumi........meas.......$tech...0....rTRC...<....gTRC...<....bTRC...<....text....Copyright (c) 1998 Hewlett-Packard Company..desc........sRGB IEC61966-2.1............sRGB IEC61966-2.1..................................................XYZ .......Q........XYZ ................XYZ ......o...8.....XYZ ......b.........XYZ ......$.........desc........IEC http://www.iec.ch............IEC http://www.iec.ch..............................................desc........IEC 61966-2.1 Default RGB colour space - sRGB............IEC 61966-2.1 Default RGB colour space - sRGB......................desc.......,Reference Vi
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):32038
                                                    Entropy (8bit):3.9225061132461403
                                                    Encrypted:false
                                                    SSDEEP:192:HM0v0/PuzXNe7R8BgImucDiBKy8xe2MVsqh1v5h4p6d475zDnSBjCuFsX:s8muxe7RbycDikbBMVsivAp62VWBj
                                                    MD5:C86658E2071AAEF5D7B32F60B035C2F3
                                                    SHA1:ECF794F3F18B68AF08BE0A65887356DE817E9FB7
                                                    SHA-256:4B65C48912BB076CE07F9E1D18A72F8B05E6CA597C267FA918D17E78150FF5C5
                                                    SHA-512:126C8DBCA28C6FD40612B460E5A1E6E386499EDD239FBC1CE24B349F437DBDCC1ABC115C6EDE2DC1A7813F1A975CA74EDCB701030F3686097E5D419DC67EE2E5
                                                    Malicious:false
                                                    Preview:............ .h...F... .... .........00.... ..%..V...@@.... .(B...:..(....... ..... .....@.......................................................................................zx..$!.i.......q?A............................................... .Q...................." .5.......................................................................eD<......................43.%............................................)(.-.......................................................................[UZ.........................s),.1JB..&$.!...................................."..;LC.........-............(%.E...........................e...................S.......k...#...............................i...................].......q...{...'....................((.G..............._...............a...S...........s...........................................+...............................g...............G.......................W...............M...............................................................g...?..
                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):150
                                                    Entropy (8bit):5.014256965044084
                                                    Encrypted:false
                                                    SSDEEP:3:vFWWMNHUz/cIMOoT02V7VKXRAmIRMNHjFHr0lUfEyhTRD+RAW4QIMOov:TMV0kI002V7VQ7VJdfEyFRDuAW4QIm
                                                    MD5:84F2F872035A2B2007494208AC3B98C4
                                                    SHA1:385B4BF0D62025D669935F690B9B64345DE41273
                                                    SHA-256:F5BA88B4A9928B710C9DBF757F0C4DEE5BC6B6A56985D5BFEBA8620C8AE65B6C
                                                    SHA-512:D1F141DA4761D82FEB78563DDBAEF0C7B422CC4D80DB23A9895B71EC525FFDB907351D9ECFD263EE1004DCF919EF66E287A254117E24EAB6DA2AE539779DB2E6
                                                    Malicious:false
                                                    Preview:<?xml version="1.0"?>..<configuration>...<startup><supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.5"/>...</startup>..</configuration>..
                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):150
                                                    Entropy (8bit):5.014256965044084
                                                    Encrypted:false
                                                    SSDEEP:3:vFWWMNHUz/cIMOoT02V7VKXRAmIRMNHjFHr0lUfEyhTRD+RAW4QIMOov:TMV0kI002V7VQ7VJdfEyFRDuAW4QIm
                                                    MD5:84F2F872035A2B2007494208AC3B98C4
                                                    SHA1:385B4BF0D62025D669935F690B9B64345DE41273
                                                    SHA-256:F5BA88B4A9928B710C9DBF757F0C4DEE5BC6B6A56985D5BFEBA8620C8AE65B6C
                                                    SHA-512:D1F141DA4761D82FEB78563DDBAEF0C7B422CC4D80DB23A9895B71EC525FFDB907351D9ECFD263EE1004DCF919EF66E287A254117E24EAB6DA2AE539779DB2E6
                                                    Malicious:false
                                                    Preview:<?xml version="1.0"?>..<configuration>...<startup><supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.5"/>...</startup>..</configuration>..
                                                    Process:C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {A232982E-298B-41EA-93F1-4F055FADF244}, Title: MailsDaddy Thunderbird to Outlook Converter, Author: MailsDaddy Software (P) Ltd., Number of Words: 2, Last Saved Time/Date: Wed Oct 7 08:41:05 2020, Last Printed: Wed Oct 7 08:41:05 2020
                                                    Category:dropped
                                                    Size (bytes):8503808
                                                    Entropy (8bit):7.943057438543247
                                                    Encrypted:false
                                                    SSDEEP:196608:wKx7EobZC0JsWLJPC8O1tDEZmsoinEVhzRSW8KHhKKV:x7ElSsWLJK8eOmsHO8Kg
                                                    MD5:7F5CBD30246515F4E8CEF07794854EDF
                                                    SHA1:51C38B3AF8AD36C7772D189A27D2B785CBDF326F
                                                    SHA-256:2C0B55E2732CD820C82E91B9C9E63CAC50CC4E278D2DF9BCFFCABAB5D900E9F2
                                                    SHA-512:D49F8165B8A7B4D7C8C1E22CDF30239F03B8BB32428BB0D435B084A795F07C378C99DA129A2B391397879AE3C6A4B6D6FBC9325B9EFFBA56942B7D2EBA2A6A78
                                                    Malicious:false
                                                    Preview:......................>...................................8...................u...v...w...x...y.......j.......u.......^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...............................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...F...k...:...;...<...=...>...?...@...A...B...C...D...Y.......G...H...I...J...K...L...M...N...O...P...Q...R.......'...U...V...W...X...\...h...[...m...]...^..._...`...a...b...c...d...e...f...g...o...i...j...l.......p...n...E...q...S...r...s...t...........................
                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):305152
                                                    Entropy (8bit):6.502472638528862
                                                    Encrypted:false
                                                    SSDEEP:6144:BvAODIPKUuUw4hZXvadywUyZPTXfHjo4yAhbhuKuNY0mGA7yYGuDqf4uY:tZIPKUZw4/XvAHUyhPHjo4yAhbJuNY0S
                                                    MD5:373E46A1E858B6A10432D589DE09732F
                                                    SHA1:26E71B5373999A23EB6E2A282DE3683DD9D698B5
                                                    SHA-256:0357B1185454D1A7D0C72DE5AF8E82A2185C0F1E52FB2D21B53E149D0A688041
                                                    SHA-512:9B83F10F5E1CBE8FF97A5EAD0CA02FCE5F58E6E573077D2293F5C34E8D894836DD8E2A6B1DCDFA6C98F156704208F85E8595046527ADAB3FBE831236C71AAEF8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: UTSetup.msi, Detection: malicious, Browse
                                                    • Filename: ICE_Auto_Setup1.3signed.exe, Detection: malicious, Browse
                                                    • Filename: ICE_Auto_Setup1.3signed.exe, Detection: malicious, Browse
                                                    • Filename: Setupfr.msi, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|U..84..84..84...Z..;4......;4...U..<4....0.54....2..4....3.%4...Y..j4...Y..)4...Y..-4......#4..84..f5...Z..$4...Z..94...Z>.94...Z..94..Rich84..........PE..L.....__.........."!.....N...v......%........`............................................@.........................@Z..:............... .......................p....'..T............................(..@............................................text...zL.......N.................. ..`.data...<....`.......R..............@....idata...............b..............@..@.rsrc... ............r..............@..@.reloc..p........0...x..............@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):305152
                                                    Entropy (8bit):6.502472638528862
                                                    Encrypted:false
                                                    SSDEEP:6144:BvAODIPKUuUw4hZXvadywUyZPTXfHjo4yAhbhuKuNY0mGA7yYGuDqf4uY:tZIPKUZw4/XvAHUyhPHjo4yAhbJuNY0S
                                                    MD5:373E46A1E858B6A10432D589DE09732F
                                                    SHA1:26E71B5373999A23EB6E2A282DE3683DD9D698B5
                                                    SHA-256:0357B1185454D1A7D0C72DE5AF8E82A2185C0F1E52FB2D21B53E149D0A688041
                                                    SHA-512:9B83F10F5E1CBE8FF97A5EAD0CA02FCE5F58E6E573077D2293F5C34E8D894836DD8E2A6B1DCDFA6C98F156704208F85E8595046527ADAB3FBE831236C71AAEF8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: UTSetup.msi, Detection: malicious, Browse
                                                    • Filename: ICE_Auto_Setup1.3signed.exe, Detection: malicious, Browse
                                                    • Filename: ICE_Auto_Setup1.3signed.exe, Detection: malicious, Browse
                                                    • Filename: Setupfr.msi, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|U..84..84..84...Z..;4......;4...U..<4....0.54....2..4....3.%4...Y..j4...Y..)4...Y..-4......#4..84..f5...Z..$4...Z..94...Z>.94...Z..94..Rich84..........PE..L.....__.........."!.....N...v......%........`............................................@.........................@Z..:............... .......................p....'..T............................(..@............................................text...zL.......N.................. ..`.data...<....`.......R..............@....idata...............b..............@..@.rsrc... ............r..............@..@.reloc..p........0...x..............@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):32038
                                                    Entropy (8bit):3.9209881965027082
                                                    Encrypted:false
                                                    SSDEEP:192:DM0v0/PezXNe7RPBgImucDiBKyexe2MVsqh1v5h4p6d475zDnSBjCuFsX:Q8mexe7ROycDik5BMVsivAp62VWBj
                                                    MD5:FC8C28EC894EEF0CBB35A6FFBD6572C6
                                                    SHA1:8BA6DB21304875FF8651B6638814043694230A5A
                                                    SHA-256:B2ECF59D2459DD11B73007636AE7914101E59531BBF087F1A9477C10F174E221
                                                    SHA-512:39502B54747CB2ABF4E6E74A4A39F1DBE78B358F338C2C196C689CDC50DAFA461844594FC90A3066E6D1FBB4B3A0F4390F12472AFFE8A497679D3697CD0356FC
                                                    Malicious:false
                                                    Preview:............ .h...F... .... .........00.... ..%..V...@@.... .(B...:..(....... ..... .............................................................................................zx..$!.i.......q?A............................................... .Q...................." .5.......................................................................eD<......................43.%............................................)(.-.......................................................................[UZ.........................s),.1JB..&$.!...................................."..;LC.........-............(%.E...........................e...................S.......k...#...............................i...................].......q...{...'....................((.G..............._...............a...S...........s...........................................+...............................g...............G.......................W...............M...............................................................g...?..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):32038
                                                    Entropy (8bit):3.9209881965027082
                                                    Encrypted:false
                                                    SSDEEP:192:DM0v0/PezXNe7RPBgImucDiBKyexe2MVsqh1v5h4p6d475zDnSBjCuFsX:Q8mexe7ROycDik5BMVsivAp62VWBj
                                                    MD5:FC8C28EC894EEF0CBB35A6FFBD6572C6
                                                    SHA1:8BA6DB21304875FF8651B6638814043694230A5A
                                                    SHA-256:B2ECF59D2459DD11B73007636AE7914101E59531BBF087F1A9477C10F174E221
                                                    SHA-512:39502B54747CB2ABF4E6E74A4A39F1DBE78B358F338C2C196C689CDC50DAFA461844594FC90A3066E6D1FBB4B3A0F4390F12472AFFE8A497679D3697CD0356FC
                                                    Malicious:false
                                                    Preview:............ .h...F... .... .........00.... ..%..V...@@.... .(B...:..(....... ..... .............................................................................................zx..$!.i.......q?A............................................... .Q...................." .5.......................................................................eD<......................43.%............................................)(.-.......................................................................[UZ.........................s),.1JB..&$.!...................................."..;LC.........-............(%.E...........................e...................S.......k...#...............................i...................].......q...{...'....................((.G..............._...............a...S...........s...........................................+...............................g...............G.......................W...............M...............................................................g...?..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):32038
                                                    Entropy (8bit):3.9209881965027082
                                                    Encrypted:false
                                                    SSDEEP:192:DM0v0/PezXNe7RPBgImucDiBKyexe2MVsqh1v5h4p6d475zDnSBjCuFsX:Q8mexe7ROycDik5BMVsivAp62VWBj
                                                    MD5:FC8C28EC894EEF0CBB35A6FFBD6572C6
                                                    SHA1:8BA6DB21304875FF8651B6638814043694230A5A
                                                    SHA-256:B2ECF59D2459DD11B73007636AE7914101E59531BBF087F1A9477C10F174E221
                                                    SHA-512:39502B54747CB2ABF4E6E74A4A39F1DBE78B358F338C2C196C689CDC50DAFA461844594FC90A3066E6D1FBB4B3A0F4390F12472AFFE8A497679D3697CD0356FC
                                                    Malicious:false
                                                    Preview:............ .h...F... .... .........00.... ..%..V...@@.... .(B...:..(....... ..... .............................................................................................zx..$!.i.......q?A............................................... .Q...................." .5.......................................................................eD<......................43.%............................................)(.-.......................................................................[UZ.........................s),.1JB..&$.!...................................."..;LC.........-............(%.E...........................e...................S.......k...#...............................i...................].......q...{...'....................((.G..............._...............a...S...........s...........................................+...............................g...............G.......................W...............M...............................................................g...?..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):32038
                                                    Entropy (8bit):3.9209881965027082
                                                    Encrypted:false
                                                    SSDEEP:192:DM0v0/PezXNe7RPBgImucDiBKyexe2MVsqh1v5h4p6d475zDnSBjCuFsX:Q8mexe7ROycDik5BMVsivAp62VWBj
                                                    MD5:FC8C28EC894EEF0CBB35A6FFBD6572C6
                                                    SHA1:8BA6DB21304875FF8651B6638814043694230A5A
                                                    SHA-256:B2ECF59D2459DD11B73007636AE7914101E59531BBF087F1A9477C10F174E221
                                                    SHA-512:39502B54747CB2ABF4E6E74A4A39F1DBE78B358F338C2C196C689CDC50DAFA461844594FC90A3066E6D1FBB4B3A0F4390F12472AFFE8A497679D3697CD0356FC
                                                    Malicious:false
                                                    Preview:............ .h...F... .... .........00.... ..%..V...@@.... .(B...:..(....... ..... .............................................................................................zx..$!.i.......q?A............................................... .Q...................." .5.......................................................................eD<......................43.%............................................)(.-.......................................................................[UZ.........................s),.1JB..&$.!...................................."..;LC.........-............(%.E...........................e...................S.......k...#...............................i...................].......q...{...'....................((.G..............._...............a...S...........s...........................................+...............................g...............G.......................W...............M...............................................................g...?..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                    Category:dropped
                                                    Size (bytes):3149
                                                    Entropy (8bit):3.0027955473954524
                                                    Encrypted:false
                                                    SSDEEP:24:8ARGTU9drsg67IuNA7CYti+D5S2whjaDnFdDEwQUZo/vLrkjaDnCl3HOG4+Ydu1T:8FTU6IuwSRwdYwQW6IJl3wvdu1U
                                                    MD5:D5FC57D56430E56F7B4FD799B187148D
                                                    SHA1:BBF188779C07BA1EC347CEE3E20ED6A6EEE5381A
                                                    SHA-256:67276745ED804EB0E8FC136789577E21E38EA5243A27E7391E8D7052B592D7F9
                                                    SHA-512:87648BECD389C130A9875B346982BB10FCF6AB5BF89DB8615D390844D4B7B484558F255DB22455E27A532B2ACA67DA6C514F2B2F9DB4064177F3C56EBCB0EF33
                                                    Malicious:false
                                                    Preview:L..................F.P......................................................u....P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH^Y......................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....^Y....user.<......CW.^^Y............................y.5.j.o.n.e.s.....V.1.....CW.^..AppData.@......CW.^^Y.............................%..A.p.p.D.a.t.a.....V.1.....^Y....Roaming.@......CW.^^Y..............................0.R.o.a.m.i.n.g.....\.1.....^Y$...MICROS~1..D......CW.^^Y$...........................;...M.i.c.r.o.s.o.f.t.....\.1.....^Y$...INSTAL~1..D......^Y$.^Y$.....D.....................>...I.n.s.t.a.l.l.e.r.......1.....^Y$...{7A41F~1..~......^Y$.^Y$.....I.....................~...{.7.A.4.1.F.4.3.B.-.6.B.B.A.-.4.1.C.2.-.9.3.0.2.-.0.B.D.D.E.B.B.C.0.3.8.C.}.......2.&}..^Y$.!._59A44~1.EXE..h......^Y$.^Y$............................+.._.5.9.A.4.4.D.4.F.4.9.2.8.D.8.4.7.A.B.3.E.4.3...e.x.e.......X.....\.....\.....\.....\.I.n.s.t.a.l
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                    Category:dropped
                                                    Size (bytes):3183
                                                    Entropy (8bit):3.0107411655289824
                                                    Encrypted:false
                                                    SSDEEP:24:8ARGTU9drsg67IuNA7CYti+D5SM3kjaDSdDEwQUZo/vLrkjaDLl3HOG4+Ydu1DQ5:8FTU6IuwSM03dYwQW6Isl3wvdu1z
                                                    MD5:CA317E63270B528FB12620EE9014B5A6
                                                    SHA1:AA3A6B6F8BBBC451588971AF199BEA9229C20755
                                                    SHA-256:75B03EF1F6F8BA7A16CD2D5B91C2B91990009F61A8518DC161A7EEC53A978F83
                                                    SHA-512:2422C58CAC2C67F011F3AC07A1E0517687E46302C49D2E27E0EEBF2CBC5131383C3DEE4529138923B93DEFA34634B39B71C898DA2BFBCE172EFC52DF8C80ED0C
                                                    Malicious:false
                                                    Preview:L..................F.P......................................................u....P.O. .:i.....+00.../C:\...................x.1.....CW;^..Users.d......OwH^Y......................:.....K...U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....P.1.....^Y....user.<......CW.^^Y............................y.5.j.o.n.e.s.....V.1.....CW.^..AppData.@......CW.^^Y.............................%..A.p.p.D.a.t.a.....V.1.....^Y....Roaming.@......CW.^^Y..............................0.R.o.a.m.i.n.g.....\.1.....^Y$...MICROS~1..D......CW.^^Y$...........................;...M.i.c.r.o.s.o.f.t.....\.1.....^Y$...INSTAL~1..D......^Y$.^Y$.....D.....................>...I.n.s.t.a.l.l.e.r.......1.....^Y$...{7A41F~1..~......^Y$.^Y$.....I.....................~...{.7.A.4.1.F.4.3.B.-.6.B.B.A.-.4.1.C.2.-.9.3.0.2.-.0.B.D.D.E.B.B.C.0.3.8.C.}.......2.&}..^Y$.!._1ABCA~1.EXE..h......^Y$.^Y$...........................~..._.1.A.B.C.A.D.3.7.8.3.6.1.F.6.7.8.0.5.0.D.B.6...e.x.e.......i.....\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {A232982E-298B-41EA-93F1-4F055FADF244}, Title: MailsDaddy Thunderbird to Outlook Converter, Author: MailsDaddy Software (P) Ltd., Number of Words: 2, Last Saved Time/Date: Wed Oct 7 08:41:05 2020, Last Printed: Wed Oct 7 08:41:05 2020
                                                    Category:dropped
                                                    Size (bytes):8503808
                                                    Entropy (8bit):7.943057438543247
                                                    Encrypted:false
                                                    SSDEEP:196608:wKx7EobZC0JsWLJPC8O1tDEZmsoinEVhzRSW8KHhKKV:x7ElSsWLJK8eOmsHO8Kg
                                                    MD5:7F5CBD30246515F4E8CEF07794854EDF
                                                    SHA1:51C38B3AF8AD36C7772D189A27D2B785CBDF326F
                                                    SHA-256:2C0B55E2732CD820C82E91B9C9E63CAC50CC4E278D2DF9BCFFCABAB5D900E9F2
                                                    SHA-512:D49F8165B8A7B4D7C8C1E22CDF30239F03B8BB32428BB0D435B084A795F07C378C99DA129A2B391397879AE3C6A4B6D6FBC9325B9EFFBA56942B7D2EBA2A6A78
                                                    Malicious:false
                                                    Preview:......................>...................................8...................u...v...w...x...y.......j.......u.......^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...............................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...F...k...:...;...<...=...>...?...@...A...B...C...D...Y.......G...H...I...J...K...L...M...N...O...P...Q...R.......'...U...V...W...X...\...h...[...m...]...^..._...`...a...b...c...d...e...f...g...o...i...j...l.......p...n...E...q...S...r...s...t...........................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {A232982E-298B-41EA-93F1-4F055FADF244}, Title: MailsDaddy Thunderbird to Outlook Converter, Author: MailsDaddy Software (P) Ltd., Number of Words: 2, Last Saved Time/Date: Wed Oct 7 08:41:05 2020, Last Printed: Wed Oct 7 08:41:05 2020
                                                    Category:dropped
                                                    Size (bytes):8503808
                                                    Entropy (8bit):7.943057438543247
                                                    Encrypted:false
                                                    SSDEEP:196608:wKx7EobZC0JsWLJPC8O1tDEZmsoinEVhzRSW8KHhKKV:x7ElSsWLJK8eOmsHO8Kg
                                                    MD5:7F5CBD30246515F4E8CEF07794854EDF
                                                    SHA1:51C38B3AF8AD36C7772D189A27D2B785CBDF326F
                                                    SHA-256:2C0B55E2732CD820C82E91B9C9E63CAC50CC4E278D2DF9BCFFCABAB5D900E9F2
                                                    SHA-512:D49F8165B8A7B4D7C8C1E22CDF30239F03B8BB32428BB0D435B084A795F07C378C99DA129A2B391397879AE3C6A4B6D6FBC9325B9EFFBA56942B7D2EBA2A6A78
                                                    Malicious:false
                                                    Preview:......................>...................................8...................u...v...w...x...y.......j.......u.......^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...{...|...}...~...............................................................................................................................................................................................................................................................................Z................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...F...k...:...;...<...=...>...?...@...A...B...C...D...Y.......G...H...I...J...K...L...M...N...O...P...Q...R.......'...U...V...W...X...\...h...[...m...]...^..._...`...a...b...c...d...e...f...g...o...i...j...l.......p...n...E...q...S...r...s...t...........................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):305152
                                                    Entropy (8bit):6.502472638528862
                                                    Encrypted:false
                                                    SSDEEP:6144:BvAODIPKUuUw4hZXvadywUyZPTXfHjo4yAhbhuKuNY0mGA7yYGuDqf4uY:tZIPKUZw4/XvAHUyhPHjo4yAhbJuNY0S
                                                    MD5:373E46A1E858B6A10432D589DE09732F
                                                    SHA1:26E71B5373999A23EB6E2A282DE3683DD9D698B5
                                                    SHA-256:0357B1185454D1A7D0C72DE5AF8E82A2185C0F1E52FB2D21B53E149D0A688041
                                                    SHA-512:9B83F10F5E1CBE8FF97A5EAD0CA02FCE5F58E6E573077D2293F5C34E8D894836DD8E2A6B1DCDFA6C98F156704208F85E8595046527ADAB3FBE831236C71AAEF8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|U..84..84..84...Z..;4......;4...U..<4....0.54....2..4....3.%4...Y..j4...Y..)4...Y..-4......#4..84..f5...Z..$4...Z..94...Z>.94...Z..94..Rich84..........PE..L.....__.........."!.....N...v......%........`............................................@.........................@Z..:............... .......................p....'..T............................(..@............................................text...zL.......N.................. ..`.data...<....`.......R..............@....idata...............b..............@..@.rsrc... ............r..............@..@.reloc..p........0...x..............@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):305152
                                                    Entropy (8bit):6.502472638528862
                                                    Encrypted:false
                                                    SSDEEP:6144:BvAODIPKUuUw4hZXvadywUyZPTXfHjo4yAhbhuKuNY0mGA7yYGuDqf4uY:tZIPKUZw4/XvAHUyhPHjo4yAhbJuNY0S
                                                    MD5:373E46A1E858B6A10432D589DE09732F
                                                    SHA1:26E71B5373999A23EB6E2A282DE3683DD9D698B5
                                                    SHA-256:0357B1185454D1A7D0C72DE5AF8E82A2185C0F1E52FB2D21B53E149D0A688041
                                                    SHA-512:9B83F10F5E1CBE8FF97A5EAD0CA02FCE5F58E6E573077D2293F5C34E8D894836DD8E2A6B1DCDFA6C98F156704208F85E8595046527ADAB3FBE831236C71AAEF8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|U..84..84..84...Z..;4......;4...U..<4....0.54....2..4....3.%4...Y..j4...Y..)4...Y..-4......#4..84..f5...Z..$4...Z..94...Z>.94...Z..94..Rich84..........PE..L.....__.........."!.....N...v......%........`............................................@.........................@Z..:............... .......................p....'..T............................(..@............................................text...zL.......N.................. ..`.data...<....`.......R..............@....idata...............b..............@..@.rsrc... ............r..............@..@.reloc..p........0...x..............@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):140232
                                                    Entropy (8bit):4.364749405051337
                                                    Encrypted:false
                                                    SSDEEP:1536:r7RLqGLuwE7RLqGLuwx7RLqGLuwe7RLqGLuwfMYg/ZluGbBr:rLELxLeLfMYg/ZluGbBr
                                                    MD5:40DF49538A4F1568ACBD53FE6E21B684
                                                    SHA1:195BF1469C709B76B147EF81C0A4FD18040481D4
                                                    SHA-256:43493F5E06DA94AA0E8F8D77B3959792BD096ED3E9CFE1A4AB4D5C3CC4515E38
                                                    SHA-512:13C91FEFA8431ED586ECDCFF3D6634E60DECDE791F7803379B1E3B896DBEEDDF1E0CF2EB82423EB1CC14CEF27E4F7C59D1F2F16FEBEEE5AA061E7EFA81F73EA2
                                                    Malicious:false
                                                    Preview:...@IXOS.@.....@#.^Y.@.....@.....@.....@.....@.....@......&.{7A41F43B-6BBA-41C2-9302-0BDDEBBC038C}+.MailsDaddy Thunderbird to Outlook Converter..MSIF618.tmp.@.....@.....@.....@......_853F67D554F05449430E7E.exe..&.{A232982E-298B-41EA-93F1-4F055FADF244}.....@.....@.....@.....@.......@.....@.....@.......@....+.MailsDaddy Thunderbird to Outlook Converter......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{D98F3635-E5A6-E697-8AEA-FF9A58963D52}z.C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.tlb.@.......@.....@.....@......&.{D8237FD1-DE18-5DC1-0EC9-35347546BBF7}z.C:\Program Files (x86)\MailsDaddy Software (P) Ltd\MailsDaddy Thunderbird to Outlook Converter\TreeksLicensingLibrary2.DLL.@.......@.....@.....@......&.{06856F88-F013-FCFE-B98E-FDE3FF5B6CA6}i.C:\Program Files (x86)\MailsDaddy So
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.1629380802620353
                                                    Encrypted:false
                                                    SSDEEP:12:JSbX72FjGSAGiLIlHVRpY5h/7777777777777777777777777vDHFzuUOdy/spdz:JYSQI5eof0/JF
                                                    MD5:65E9F716AA8BFC8478E962734D154B71
                                                    SHA1:6EDF0FDEE72D49ECE16AA9B4B09F2D95742A0632
                                                    SHA-256:D7AC05F8F8F70D0C6B3FBD71C7E80E9C9A29D75E4963BCA41208D1B7708247D3
                                                    SHA-512:8117E65EB38049448AEF186678C3E141E33FBA6C7B6E6A5AE8C1244DC224D0F7CA2CDD0BFECA29D1E9AA0469B4450AD5AA3B7DD8C9AE45750B111165EC0BBA66
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.7612796069995205
                                                    Encrypted:false
                                                    SSDEEP:48:b8PhauRc06WXJEjT5SlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQWG:Cha1HjT0brcuH60CiIH70CG
                                                    MD5:4C572B71A7E1C13B1B741F50726B9E3F
                                                    SHA1:E252FF259CE45F915753ED0F8716D405FCF3E704
                                                    SHA-256:D17B0FACD095B03DD902202FA7469D4F50E80071101F938563D2FA3A50C3A97A
                                                    SHA-512:2D6A81EA2D04194B4615CF806B5AAFBD5B4ED42763A58F7D33EB255963E37457D536CEDF18A2951653CC7AC3A843C44CBFCA76D1C035FD2DBB823C6EE1C047D8
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):432220
                                                    Entropy (8bit):5.375169812639068
                                                    Encrypted:false
                                                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgauq:zTtbmkExhMJCIpEr1
                                                    MD5:72E179D38A9DED4264AAAD3117709864
                                                    SHA1:C7321E41AFC02AB9A8F5412D5790EA21831793BF
                                                    SHA-256:19CDCAA04590EA4390AB81BDDF8A4356F1594E0F63ED51D3CCC265F698E023E9
                                                    SHA-512:D4D88A01582F08B6C804854D730100B5693B5504289F977C9F11D0FF5F1422EB4D96EE54F15EBEDEA12FF405FD322375A8071509A9AA5234128AE4643F891238
                                                    Malicious:false
                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.7612796069995205
                                                    Encrypted:false
                                                    SSDEEP:48:b8PhauRc06WXJEjT5SlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQWG:Cha1HjT0brcuH60CiIH70CG
                                                    MD5:4C572B71A7E1C13B1B741F50726B9E3F
                                                    SHA1:E252FF259CE45F915753ED0F8716D405FCF3E704
                                                    SHA-256:D17B0FACD095B03DD902202FA7469D4F50E80071101F938563D2FA3A50C3A97A
                                                    SHA-512:2D6A81EA2D04194B4615CF806B5AAFBD5B4ED42763A58F7D33EB255963E37457D536CEDF18A2951653CC7AC3A843C44CBFCA76D1C035FD2DBB823C6EE1C047D8
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):69632
                                                    Entropy (8bit):0.22317736253951748
                                                    Encrypted:false
                                                    SSDEEP:48:3kT+SkdYwQW71iCyGSkdYwQW61iCyX5lt4pW5lt4goowrKlQrQ9nol:3vH70CdH60CihQr1
                                                    MD5:73B74CC4FBEA19D850258659FD863548
                                                    SHA1:D6987EDE5B8898FA4DBF55F39571ACBB6551D698
                                                    SHA-256:75D951CA0BF6462A1A16920F9F51136B238FBF02E78E64A313DC896B9693B9B3
                                                    SHA-512:2F2306817BC6CB12B8389B2034328B7E2212E9164384E55E4E5E136FD9B72373C227BE72D191BDD10138700B416DA5CC7E3DF4A7A2CB2A64E019C5116EACC19C
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.396048141246669
                                                    Encrypted:false
                                                    SSDEEP:48:ZHyu0JveFXJfT50oMlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQW7S:VyuHTOLbrcuH60CiIH70CG
                                                    MD5:06D2E64146ABBC71597BC74BBFE85B0C
                                                    SHA1:DDCB38E12410FDED48DD60CEB275EF70E24D3DBD
                                                    SHA-256:75117BB1D2C2250877465380E867D38F50B96D2820C74F01762A7EB5776D9894
                                                    SHA-512:C52F3D29E495F1C961A323A7CBCC2B9FEF0707F5EE8A3C83B7A96B534F8989ADA08B1CB28A24B0CE4E1A8663248D62099D8B30D28F6CCB9A2395F49F6F4FB596
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.396048141246669
                                                    Encrypted:false
                                                    SSDEEP:48:ZHyu0JveFXJfT50oMlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQW7S:VyuHTOLbrcuH60CiIH70CG
                                                    MD5:06D2E64146ABBC71597BC74BBFE85B0C
                                                    SHA1:DDCB38E12410FDED48DD60CEB275EF70E24D3DBD
                                                    SHA-256:75117BB1D2C2250877465380E867D38F50B96D2820C74F01762A7EB5776D9894
                                                    SHA-512:C52F3D29E495F1C961A323A7CBCC2B9FEF0707F5EE8A3C83B7A96B534F8989ADA08B1CB28A24B0CE4E1A8663248D62099D8B30D28F6CCB9A2395F49F6F4FB596
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.7612796069995205
                                                    Encrypted:false
                                                    SSDEEP:48:b8PhauRc06WXJEjT5SlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQWG:Cha1HjT0brcuH60CiIH70CG
                                                    MD5:4C572B71A7E1C13B1B741F50726B9E3F
                                                    SHA1:E252FF259CE45F915753ED0F8716D405FCF3E704
                                                    SHA-256:D17B0FACD095B03DD902202FA7469D4F50E80071101F938563D2FA3A50C3A97A
                                                    SHA-512:2D6A81EA2D04194B4615CF806B5AAFBD5B4ED42763A58F7D33EB255963E37457D536CEDF18A2951653CC7AC3A843C44CBFCA76D1C035FD2DBB823C6EE1C047D8
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):0.0702180129077671
                                                    Encrypted:false
                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOyIJjuWTOIbETyfVky6lf1:2F0i8n0itFzDHFzuUOdyid
                                                    MD5:915A5E99D988337F53F6EDB4194AB90F
                                                    SHA1:8E1C01EE20D1135DB38173BD739D62B9A512C56C
                                                    SHA-256:0076AD1D7BE382D922A40386F5B0B22FEBA06C60E720AC4B4466C5BD8A00FDDF
                                                    SHA-512:81923BDDCEDDE4C95C9143C2661C05ED163FD2EE8941E52546F2B142D7B4A122A5815243B16A84B0DAB8E7DE5D249BA437EB1EBD16E181F4036F012A769788B8
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.396048141246669
                                                    Encrypted:false
                                                    SSDEEP:48:ZHyu0JveFXJfT50oMlSE99r0luSkdYwQW61iCyX5lt4pW5lt4goowrTSkdYwQW7S:VyuHTOLbrcuH60CiIH70CG
                                                    MD5:06D2E64146ABBC71597BC74BBFE85B0C
                                                    SHA1:DDCB38E12410FDED48DD60CEB275EF70E24D3DBD
                                                    SHA-256:75117BB1D2C2250877465380E867D38F50B96D2820C74F01762A7EB5776D9894
                                                    SHA-512:C52F3D29E495F1C961A323A7CBCC2B9FEF0707F5EE8A3C83B7A96B534F8989ADA08B1CB28A24B0CE4E1A8663248D62099D8B30D28F6CCB9A2395F49F6F4FB596
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.932118436915041
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.55%
                                                    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:thunderbird-to-outlook-converter.exe
                                                    File size:8'612'560 bytes
                                                    MD5:ed6c1f0e4bc19623cbbad48cf84ab099
                                                    SHA1:ea54f4b7f52c6948c102d452a615671738427bce
                                                    SHA256:28923cdeb17db6f79d0f7c134daa9343cb99253921c1f4054d201b1e242305ca
                                                    SHA512:a91b1286e23bfd4d4daadbb20536df223787ddc1264a575de412d4cf48491ab06f595ce358cc883be6a8877f457086f78051f8ab053f01ed8d2d4b02b3ca3eac
                                                    SSDEEP:196608:gKx7EobZC0JsWLJPC8O1tDEZmsoinEVhzRSW8KHhKKVr:h7ElSsWLJK8eOmsHO8KgE
                                                    TLSH:B08623C63041D63AC19931F9691AD26011EAFF1068E096B7A374F2781D329C3DF6AF5E
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m..............&~......&m......&n.......^..............&q......&.......&{.....Rich............................PE..L.....kI...
                                                    Icon Hash:07236d2632190541
                                                    Entrypoint:0x401f54
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:
                                                    Time Stamp:0x496BFC80 [Tue Jan 13 02:29:20 2009 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:0f7d0ed8477bf9ca9b4b2ce07e02a90e
                                                    Signature Valid:true
                                                    Signature Issuer:CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
                                                    Signature Validation Error:The operation completed successfully
                                                    Error Number:0
                                                    Not Before, Not After
                                                    • 07/04/2020 11:32:51 12/04/2021 20:35:51
                                                    Subject Chain
                                                    • CN=Mails Daddy Software Private Limited, O=Mails Daddy Software Private Limited, L=Delhi, C=IN
                                                    Version:3
                                                    Thumbprint MD5:3763B7CA36279068AF0AB9644E09AF35
                                                    Thumbprint SHA-1:3D5FE267B4A737514BB6A8CC2505C7FE7956E623
                                                    Thumbprint SHA-256:A98DB06864310A11083457FD9102A1D13E8E958ABD2D827C9F01B832655B4E23
                                                    Serial:00F5AD6D27109B5ED4
                                                    Instruction
                                                    call 00007FB41CB12B04h
                                                    jmp 00007FB41CB0FE3Ch
                                                    push ebp
                                                    mov ebp, esp
                                                    push ecx
                                                    push esi
                                                    mov esi, dword ptr [ebp+0Ch]
                                                    push esi
                                                    call 00007FB41CB13606h
                                                    mov dword ptr [ebp+0Ch], eax
                                                    mov eax, dword ptr [esi+0Ch]
                                                    test al, 82h
                                                    pop ecx
                                                    jne 00007FB41CB10039h
                                                    call 00007FB41CB1034Eh
                                                    mov dword ptr [eax], 00000009h
                                                    or dword ptr [esi+0Ch], 20h
                                                    or eax, FFFFFFFFh
                                                    jmp 00007FB41CB10152h
                                                    test al, 40h
                                                    je 00007FB41CB1002Fh
                                                    call 00007FB41CB10333h
                                                    mov dword ptr [eax], 00000022h
                                                    jmp 00007FB41CB10005h
                                                    push ebx
                                                    xor ebx, ebx
                                                    test al, 01h
                                                    je 00007FB41CB10038h
                                                    test al, 10h
                                                    mov dword ptr [esi+04h], ebx
                                                    je 00007FB41CB100ABh
                                                    mov ecx, dword ptr [esi+08h]
                                                    and eax, FFFFFFFEh
                                                    mov dword ptr [esi], ecx
                                                    mov dword ptr [esi+0Ch], eax
                                                    mov eax, dword ptr [esi+0Ch]
                                                    and eax, FFFFFFEFh
                                                    or eax, 02h
                                                    test ax, 0000010Ch
                                                    mov dword ptr [esi+0Ch], eax
                                                    mov dword ptr [esi+04h], ebx
                                                    mov dword ptr [ebp-04h], ebx
                                                    jne 00007FB41CB1004Eh
                                                    call 00007FB41CB133F8h
                                                    add eax, 20h
                                                    cmp esi, eax
                                                    je 00007FB41CB1002Eh
                                                    call 00007FB41CB133ECh
                                                    add eax, 40h
                                                    cmp esi, eax
                                                    jne 00007FB41CB1002Fh
                                                    push dword ptr [ebp+0Ch]
                                                    call 00007FB41CB1337Fh
                                                    test eax, eax
                                                    pop ecx
                                                    jne 00007FB41CB10029h
                                                    push esi
                                                    call 00007FB41CB13330h
                                                    pop ecx
                                                    test word ptr [esi+0Ch], 0108h
                                                    push edi
                                                    je 00007FB41CB100A6h
                                                    mov eax, dword ptr [esi+08h]
                                                    mov edi, dword ptr [esi]
                                                    lea ecx, dword ptr [eax+01h]
                                                    mov dword ptr [esi], ecx
                                                    mov ecx, dword ptr [esi+18h]
                                                    sub edi, eax
                                                    Programming Language:
                                                    • [ASM] VS2005 build 50727
                                                    • [C++] VS2005 build 50727
                                                    • [ C ] VS2005 build 50727
                                                    • [RES] VS2005 build 50727
                                                    • [LNK] VS2005 build 50727
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xe5e80x50.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x824315.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x8350000x1ad0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc2000x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xde780x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1b4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000xa4940xb000faa20d416cf66a0e758d51d62d506053False0.5961692116477273data6.374283196502087IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0xc0000x2f560x3000191e5dfc6ac85f3b137e574ecc199deeFalse0.3616536458333333data5.33958366807718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xf0000x2d3c0x1000605cb8f363da7eb9d3c143ecb2c1f1c2False0.22607421875data2.365699420498644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x120000x8243150x82500010b2a7064423f5968165250d22c52ce2unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    MSI0x121d40x81c200Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Create Time/Date: Mon Jun 21 08:00:00 1999, Name of Creating Application: Windows Installer, Security: 1, Code page: 1252, Template: Intel;1033, Number of Pages: 200, Revision Number: {A232982E-298B-41EA-93F1-4F055FADF244}, Title: MailsDaddy Thunderbird to Outlook Converter, Author: MailsDaddy Software (P) Ltd., Number of Words: 2, Last Saved Time/Date: Wed Oct 7 08:41:05 2020, Last Printed: Wed Oct 7 08:41:05 2020EnglishUnited States0.5271825790405273
                                                    RT_ICON0x82e3d40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5328014184397163
                                                    RT_ICON0x82e83c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.37922138836772984
                                                    RT_ICON0x82f8e40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.337448132780083
                                                    RT_ICON0x831e8c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.30969532357109114
                                                    RT_GROUP_ICON0x8360b40x3edataEnglishUnited States0.8225806451612904
                                                    RT_MANIFEST0x8360f40x221XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5486238532110091
                                                    DLLImport
                                                    KERNEL32.dllGetTempPathW, GetTempFileNameW, FindResourceW, SizeofResource, LoadResource, LockResource, CreateThread, CreateFileW, DeleteFileW, CreateFileA, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, ExitProcess, CreateProcessW, GetLastError, WriteFile, FlushFileBuffers, CloseHandle, GetProcAddress, GetModuleHandleA, HeapFree, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetStdHandle, GetModuleFileNameA, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, LoadLibraryA, InitializeCriticalSection, GetModuleFileNameW, FreeEnvironmentStringsA, MultiByteToWideChar, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, Sleep, HeapSize, RtlUnwind, GetLocaleInfoA, VirtualAlloc, HeapReAlloc, SetStdHandle, RaiseException
                                                    USER32.dllDefWindowProcW, PostQuitMessage, EndPaint, BeginPaint, UpdateWindow, ShowWindow, CreateWindowExW, GetSystemMetrics, RegisterClassExW, GetSysColorBrush, LoadCursorW, PostMessageW, DispatchMessageW, TranslateMessage, GetMessageW, MessageBoxW, InvalidateRect
                                                    GDI32.dllTextOutW, SetBkMode, SelectObject, GetStockObject, DeleteObject
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    No network behavior found

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:17:56:49
                                                    Start date:30/10/2024
                                                    Path:C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\thunderbird-to-outlook-converter.exe"
                                                    Imagebase:0x400000
                                                    File size:8'612'560 bytes
                                                    MD5 hash:ED6C1F0E4BC19623CBBAD48CF84AB099
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:17:56:49
                                                    Start date:30/10/2024
                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSIF618.tmp
                                                    Imagebase:0x640000
                                                    File size:59'904 bytes
                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:17:56:49
                                                    Start date:30/10/2024
                                                    Path:C:\Windows\System32\msiexec.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                    Imagebase:0x7ff6ea700000
                                                    File size:69'632 bytes
                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:3
                                                    Start time:17:56:49
                                                    Start date:30/10/2024
                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 7290A6845925C195E7014D9F7E4EB858 C
                                                    Imagebase:0x640000
                                                    File size:59'904 bytes
                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:5
                                                    Start time:17:57:05
                                                    Start date:30/10/2024
                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding C3F8760112445D68E9871B76E5B0FA05
                                                    Imagebase:0x640000
                                                    File size:59'904 bytes
                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:4.4%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:22.9%
                                                      Total number of Nodes:621
                                                      Total number of Limit Nodes:1
                                                      execution_graph 2504 402f70 2505 402fa8 2504->2505 2506 402f9b 2504->2506 2508 401a49 __write_nolock 5 API calls 2505->2508 2507 401a49 __write_nolock 5 API calls 2506->2507 2507->2505 2511 402fb8 __except_handler4 2508->2511 2509 40303f 2510 403014 __except_handler4 2510->2509 2512 40302f 2510->2512 2513 401a49 __write_nolock 5 API calls 2510->2513 2511->2509 2511->2510 2516 403055 __except_handler4 2511->2516 2514 401a49 __write_nolock 5 API calls 2512->2514 2513->2512 2514->2509 2522 406b16 RtlUnwind 2516->2522 2517 403094 __except_handler4 2518 4030cb 2517->2518 2519 401a49 __write_nolock 5 API calls 2517->2519 2520 401a49 __write_nolock 5 API calls 2518->2520 2519->2518 2521 4030db __except_handler4 2520->2521 2522->2517 2523 401f54 2526 404a38 2523->2526 2525 401f59 2525->2525 2527 404a68 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 2526->2527 2528 404a5b 2526->2528 2529 404a5f 2527->2529 2528->2527 2528->2529 2529->2525 1812 40134e 1813 401375 _memset __EH_prolog3_catch 1812->1813 1814 4013af GetTempPathW 1813->1814 1815 4013d4 1814->1815 1816 4015cf 1814->1816 1815->1816 1817 4013dc GetTempFileNameW 1815->1817 1818 401410 FindResourceW 1817->1818 1819 4013fb 1817->1819 1818->1819 1820 401434 SizeofResource 1818->1820 1836 40a234 1819->1836 1820->1819 1821 401455 LoadResource 1820->1821 1821->1819 1823 401474 LockResource 1821->1823 1823->1819 1824 401496 CreateFileW 1823->1824 1824->1819 1825 4014cf ShowWindow 1824->1825 1826 4014f1 1825->1826 1827 4014ff WriteFile 1826->1827 1828 401529 InvalidateRect 1826->1828 1827->1826 1827->1828 1828->1826 1829 40154a ShowWindow CloseHandle 1828->1829 1833 4016cc 1829->1833 1831 40157b _memset 1832 40158a CreateProcessW ExitProcess 1831->1832 1839 401b4e 1833->1839 1837 40a267 RaiseException 1836->1837 1838 40a25b 1836->1838 1837->1818 1838->1837 1840 401b76 1839->1840 1841 401b59 1839->1841 1843 401b83 1840->1843 1845 401b90 1840->1845 1854 4022a5 1841->1854 1846 4022a5 __write_nolock 66 API calls 1843->1846 1860 401a58 1845->1860 1848 401b88 1846->1848 1851 402246 __write_nolock 66 API calls 1848->1851 1852 4016e4 1851->1852 1852->1831 1853 4022a5 __write_nolock 66 API calls 1853->1848 1875 402571 GetLastError 1854->1875 1856 401b5e 1857 402246 1856->1857 1858 4023cc ___crtInitCritSecAndSpinCount 66 API calls 1857->1858 1859 402254 __invoke_watson 1858->1859 1861 401a86 1860->1861 1862 401a66 1860->1862 1864 401a96 1861->1864 1871 401ab6 1861->1871 1863 4022a5 __write_nolock 66 API calls 1862->1863 1865 401a6b 1863->1865 1866 4022a5 __write_nolock 66 API calls 1864->1866 1867 402246 __write_nolock 66 API calls 1865->1867 1868 401a9b 1866->1868 1870 401a7b 1867->1870 1869 402246 __write_nolock 66 API calls 1868->1869 1869->1870 1870->1852 1870->1853 1871->1870 1873 401afd 1871->1873 2236 401f5e 1871->2236 1873->1870 1874 401f5e __flsbuf 100 API calls 1873->1874 1874->1870 1889 402443 TlsGetValue 1875->1889 1878 4025dc SetLastError 1878->1856 1883 4025d3 1923 40611b 1883->1923 1884 4025bb 1909 4024b2 1884->1909 1887 4025c3 GetCurrentThreadId 1887->1878 1888 4025d9 1888->1878 1890 402471 1889->1890 1891 402456 1889->1891 1890->1878 1894 4061e9 1890->1894 1892 4023cc ___crtInitCritSecAndSpinCount 64 API calls 1891->1892 1893 402461 TlsSetValue 1892->1893 1893->1890 1898 4061ed 1894->1898 1896 40259a 1896->1878 1899 4023cc TlsGetValue 1896->1899 1897 40620d Sleep 1897->1898 1898->1896 1898->1897 1936 408c8a 1898->1936 1900 402400 GetModuleHandleA 1899->1900 1901 4023df 1899->1901 1903 402411 1900->1903 1908 4023f8 1900->1908 1901->1900 1902 4023e9 TlsGetValue 1901->1902 1905 4023f4 1902->1905 2197 4022e9 1903->2197 1905->1900 1905->1908 1906 402416 1907 40241a GetProcAddress 1906->1907 1906->1908 1907->1908 1908->1883 1908->1884 2209 402f0c 1909->2209 1911 4024be GetModuleHandleA 1912 4024e0 1911->1912 1913 40250f InterlockedIncrement 1911->1913 1914 4022e9 ___crtInitCritSecAndSpinCount 62 API calls 1912->1914 1915 402bf4 __lock 62 API calls 1913->1915 1916 4024e5 1914->1916 1917 402536 1915->1917 1916->1913 1918 4024e9 GetProcAddress GetProcAddress 1916->1918 2210 405d77 InterlockedIncrement 1917->2210 1918->1913 1920 402555 2222 402568 1920->2222 1922 402562 ___crtInitCritSecAndSpinCount 1922->1887 1925 406127 ___crtInitCritSecAndSpinCount 1923->1925 1924 4061a0 __dosmaperr ___crtInitCritSecAndSpinCount 1924->1888 1925->1924 1926 402bf4 __lock 64 API calls 1925->1926 1935 406166 1925->1935 1931 40613e ___sbh_find_block 1926->1931 1927 40617b HeapFree 1927->1924 1928 40618d 1927->1928 1929 4022a5 __write_nolock 64 API calls 1928->1929 1930 406192 GetLastError 1929->1930 1930->1924 1932 406158 1931->1932 2226 4071b1 1931->2226 2232 406171 1932->2232 1935->1924 1935->1927 1937 408c96 ___crtInitCritSecAndSpinCount 1936->1937 1938 408cae 1937->1938 1947 408ccd _memset 1937->1947 1939 4022a5 __write_nolock 65 API calls 1938->1939 1940 408cb3 1939->1940 1941 402246 __write_nolock 65 API calls 1940->1941 1943 408cc3 ___crtInitCritSecAndSpinCount 1941->1943 1942 408d3f HeapAlloc 1942->1947 1943->1898 1947->1942 1947->1943 1949 402bf4 1947->1949 1956 40795a 1947->1956 1962 408d86 1947->1962 1965 403600 1947->1965 1950 402c07 1949->1950 1951 402c1a EnterCriticalSection 1949->1951 1968 402b31 1950->1968 1951->1947 1953 402c0d 1953->1951 1994 4016e8 1953->1994 1959 407986 1956->1959 1957 407a1f 1960 407a28 1957->1960 2192 407575 1957->2192 1959->1957 1959->1960 2185 4074c5 1959->2185 1960->1947 2196 402b1c LeaveCriticalSection 1962->2196 1964 408d8d 1964->1947 1966 4023cc ___crtInitCritSecAndSpinCount 66 API calls 1965->1966 1967 40360b 1966->1967 1967->1947 1969 402b3d ___crtInitCritSecAndSpinCount 1968->1969 1971 402b63 1969->1971 2001 402a45 1969->2001 1972 402b73 ___crtInitCritSecAndSpinCount 1971->1972 2047 4061a9 1971->2047 1972->1953 1977 402b94 1981 402bf4 __lock 66 API calls 1977->1981 1978 402b85 1980 4022a5 __write_nolock 66 API calls 1978->1980 1980->1972 1983 402b9b 1981->1983 1984 402ba3 1983->1984 1985 402bcf 1983->1985 2052 403531 1984->2052 1986 40611b ___freetlocinfo 66 API calls 1985->1986 1988 402bc0 1986->1988 2065 402beb 1988->2065 1989 402bae 1989->1988 1991 40611b ___freetlocinfo 66 API calls 1989->1991 1992 402bba 1991->1992 1993 4022a5 __write_nolock 66 API calls 1992->1993 1993->1988 1995 402a45 __FF_MSGBANNER 66 API calls 1994->1995 1996 4016ed 1995->1996 1997 4028a5 __amsg_exit 66 API calls 1996->1997 1998 4016f6 1997->1998 1999 4023cc ___crtInitCritSecAndSpinCount 66 API calls 1998->1999 2000 401701 1999->2000 2000->1951 2068 406900 2001->2068 2003 402a4c 2004 406900 __FF_MSGBANNER 66 API calls 2003->2004 2007 402a59 2003->2007 2004->2007 2005 4028a5 __amsg_exit 66 API calls 2006 402a71 2005->2006 2008 4028a5 __amsg_exit 66 API calls 2006->2008 2007->2005 2009 402a7b 2007->2009 2008->2009 2010 4028a5 2009->2010 2011 4028b1 2010->2011 2012 402a07 2011->2012 2013 406900 __FF_MSGBANNER 63 API calls 2011->2013 2044 401732 2012->2044 2014 4028d1 2013->2014 2015 402a0c GetStdHandle 2014->2015 2017 406900 __FF_MSGBANNER 63 API calls 2014->2017 2015->2012 2016 402a1a _strlen 2015->2016 2016->2012 2020 402a34 WriteFile 2016->2020 2018 4028e2 2017->2018 2018->2015 2019 4028f4 2018->2019 2019->2012 2075 40689b 2019->2075 2020->2012 2023 40292a GetModuleFileNameA 2025 402948 2023->2025 2030 40296b _strlen 2023->2030 2027 40689b _strcpy_s 63 API calls 2025->2027 2028 402958 2027->2028 2028->2030 2031 40214a __invoke_watson 10 API calls 2028->2031 2029 4029ae 2100 406777 2029->2100 2030->2029 2091 4067e8 2030->2091 2031->2030 2036 4029d2 2037 406777 _strcat_s 63 API calls 2036->2037 2039 4029e3 2037->2039 2038 40214a __invoke_watson 10 API calls 2038->2036 2041 4029f4 2039->2041 2042 40214a __invoke_watson 10 API calls 2039->2042 2040 40214a __invoke_watson 10 API calls 2040->2029 2109 4065ba 2041->2109 2042->2041 2146 40170c GetModuleHandleA 2044->2146 2050 4061ad 2047->2050 2049 402b7e 2049->1977 2049->1978 2050->2049 2051 4061c5 Sleep 2050->2051 2149 40700f 2050->2149 2051->2050 2053 40353d ___crtInitCritSecAndSpinCount 2052->2053 2054 4023cc ___crtInitCritSecAndSpinCount 64 API calls 2053->2054 2055 40354d 2054->2055 2059 4035a1 ___crtInitCritSecAndSpinCount 2055->2059 2167 401791 2055->2167 2057 40355d 2058 40356c 2057->2058 2060 40214a __invoke_watson 10 API calls 2057->2060 2061 403575 GetModuleHandleA 2058->2061 2062 403596 2058->2062 2059->1989 2060->2058 2061->2062 2063 403584 GetProcAddress 2061->2063 2174 402355 TlsGetValue 2062->2174 2063->2062 2184 402b1c LeaveCriticalSection 2065->2184 2067 402bf2 2067->1972 2069 40690b 2068->2069 2070 406915 2069->2070 2071 4022a5 __write_nolock 66 API calls 2069->2071 2070->2003 2072 40692e 2071->2072 2073 402246 __write_nolock 66 API calls 2072->2073 2074 40693e 2073->2074 2074->2003 2076 4068b0 2075->2076 2077 4068a8 2075->2077 2078 4022a5 __write_nolock 66 API calls 2076->2078 2077->2076 2082 4068d7 2077->2082 2079 4068b5 2078->2079 2080 402246 __write_nolock 66 API calls 2079->2080 2081 402916 2080->2081 2081->2023 2084 40214a 2081->2084 2082->2081 2083 4022a5 __write_nolock 66 API calls 2082->2083 2083->2079 2085 406540 _memset 2084->2085 2086 4021db IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 2085->2086 2087 402212 __invoke_watson 2086->2087 2088 40221e GetCurrentProcess TerminateProcess 2086->2088 2087->2088 2089 401a49 __write_nolock 5 API calls 2088->2089 2090 40223e 2089->2090 2090->2023 2095 4067f8 2091->2095 2092 4067fc 2093 4022a5 __write_nolock 66 API calls 2092->2093 2094 40299b 2092->2094 2099 406818 2093->2099 2094->2029 2094->2040 2095->2092 2095->2094 2097 406842 2095->2097 2096 402246 __write_nolock 66 API calls 2096->2094 2097->2094 2098 4022a5 __write_nolock 66 API calls 2097->2098 2098->2099 2099->2096 2101 40678c 2100->2101 2104 406784 2100->2104 2102 4022a5 __write_nolock 66 API calls 2101->2102 2103 406791 2102->2103 2105 402246 __write_nolock 66 API calls 2103->2105 2104->2101 2107 4067c1 2104->2107 2106 4029c1 2105->2106 2106->2036 2106->2038 2107->2106 2108 4022a5 __write_nolock 66 API calls 2107->2108 2108->2103 2110 4023c3 __amsg_exit 60 API calls 2109->2110 2111 4065c8 2110->2111 2112 4065e2 LoadLibraryA 2111->2112 2116 40668a 2111->2116 2113 4065f7 GetProcAddress 2112->2113 2122 40675b 2112->2122 2115 40660d 2113->2115 2113->2122 2114 406715 2118 4023cc ___crtInitCritSecAndSpinCount 60 API calls 2114->2118 2142 4066fa 2114->2142 2119 402355 ___crtInitCritSecAndSpinCount 60 API calls 2115->2119 2116->2114 2120 4023cc ___crtInitCritSecAndSpinCount 60 API calls 2116->2120 2117 4023cc ___crtInitCritSecAndSpinCount 60 API calls 2117->2122 2130 406725 2118->2130 2123 406613 GetProcAddress 2119->2123 2121 4066aa 2120->2121 2124 4023cc ___crtInitCritSecAndSpinCount 60 API calls 2121->2124 2122->2012 2125 402355 ___crtInitCritSecAndSpinCount 60 API calls 2123->2125 2132 4066b7 2124->2132 2126 406628 GetProcAddress 2125->2126 2127 402355 ___crtInitCritSecAndSpinCount 60 API calls 2126->2127 2128 40663d 2127->2128 2129 401791 ___crtInitCritSecAndSpinCount 60 API calls 2128->2129 2131 40664b 2129->2131 2133 4023cc ___crtInitCritSecAndSpinCount 60 API calls 2130->2133 2130->2142 2134 40665b 2131->2134 2136 40214a __invoke_watson 10 API calls 2131->2136 2132->2114 2135 4066e2 2132->2135 2133->2142 2134->2116 2137 406664 GetProcAddress 2134->2137 2138 4017c8 __amsg_exit 60 API calls 2135->2138 2136->2134 2139 402355 ___crtInitCritSecAndSpinCount 60 API calls 2137->2139 2140 4066eb 2138->2140 2141 406672 2139->2141 2140->2142 2144 40214a __invoke_watson 10 API calls 2140->2144 2141->2116 2143 40667c GetProcAddress 2141->2143 2142->2117 2145 402355 ___crtInitCritSecAndSpinCount 60 API calls 2143->2145 2144->2142 2145->2116 2147 40172b ExitProcess 2146->2147 2148 40171b GetProcAddress 2146->2148 2148->2147 2150 4070bc 2149->2150 2161 40701d 2149->2161 2151 403600 _malloc 65 API calls 2150->2151 2152 4070c2 2151->2152 2154 4022a5 __write_nolock 65 API calls 2152->2154 2153 402a45 __FF_MSGBANNER 65 API calls 2153->2161 2155 4070c8 2154->2155 2155->2050 2156 406fc0 _malloc 65 API calls 2156->2161 2157 4028a5 __amsg_exit 65 API calls 2157->2161 2158 407080 HeapAlloc 2158->2161 2159 401732 _malloc GetModuleHandleA GetProcAddress ExitProcess 2159->2161 2160 4070b3 2160->2050 2161->2153 2161->2156 2161->2157 2161->2158 2161->2159 2161->2160 2162 4070a7 2161->2162 2163 403600 _malloc 65 API calls 2161->2163 2165 4070a5 2161->2165 2164 4022a5 __write_nolock 65 API calls 2162->2164 2163->2161 2164->2165 2166 4022a5 __write_nolock 65 API calls 2165->2166 2166->2160 2168 40179c 2167->2168 2169 4022a5 __write_nolock 66 API calls 2168->2169 2170 4017c2 2168->2170 2171 4017a1 2169->2171 2170->2057 2172 402246 __write_nolock 66 API calls 2171->2172 2173 4017b1 2172->2173 2173->2057 2175 402368 2174->2175 2176 402389 GetModuleHandleA 2174->2176 2175->2176 2177 402372 TlsGetValue 2175->2177 2178 40239a 2176->2178 2183 402381 2176->2183 2181 40237d 2177->2181 2179 4022e9 ___crtInitCritSecAndSpinCount 62 API calls 2178->2179 2180 40239f 2179->2180 2182 4023a3 GetProcAddress 2180->2182 2180->2183 2181->2176 2181->2183 2182->2183 2183->2059 2184->2067 2186 4074d8 HeapReAlloc 2185->2186 2187 40750c HeapAlloc 2185->2187 2188 4074f6 2186->2188 2189 4074fa 2186->2189 2187->2188 2190 40752f VirtualAlloc 2187->2190 2188->1957 2189->2187 2190->2188 2191 407549 HeapFree 2190->2191 2191->2188 2193 40758a VirtualAlloc 2192->2193 2195 4075d1 2193->2195 2195->1960 2196->1964 2202 4017c8 2197->2202 2199 402304 2200 40230f GetModuleHandleA 2199->2200 2201 40230b ___crtInitCritSecAndSpinCount 2199->2201 2200->2201 2201->1906 2203 4017d3 2202->2203 2204 4022a5 __write_nolock 66 API calls 2203->2204 2205 4017f8 2203->2205 2206 4017d8 2204->2206 2205->2199 2207 402246 __write_nolock 66 API calls 2206->2207 2208 4017e8 2207->2208 2208->2199 2209->1911 2211 405d92 InterlockedIncrement 2210->2211 2212 405d95 2210->2212 2211->2212 2213 405da2 2212->2213 2214 405d9f InterlockedIncrement 2212->2214 2215 405dac InterlockedIncrement 2213->2215 2216 405daf 2213->2216 2214->2213 2215->2216 2217 405db9 InterlockedIncrement 2216->2217 2219 405dbc 2216->2219 2217->2219 2218 405dd1 InterlockedIncrement 2218->2219 2219->2218 2220 405de1 InterlockedIncrement 2219->2220 2221 405dea InterlockedIncrement 2219->2221 2220->2219 2221->1920 2225 402b1c LeaveCriticalSection 2222->2225 2224 40256f 2224->1922 2225->2224 2227 4071ee 2226->2227 2231 407490 ___sbh_free_block 2226->2231 2228 4073da VirtualFree 2227->2228 2227->2231 2229 40743e 2228->2229 2230 40744d VirtualFree HeapFree 2229->2230 2229->2231 2230->2231 2231->1932 2235 402b1c LeaveCriticalSection 2232->2235 2234 406178 2234->1935 2235->2234 2257 40554d 2236->2257 2238 401f6c 2239 401f77 2238->2239 2240 401f8e 2238->2240 2241 4022a5 __write_nolock 66 API calls 2239->2241 2242 401f92 2240->2242 2250 401f9f __flsbuf 2240->2250 2249 401f7c 2241->2249 2243 4022a5 __write_nolock 66 API calls 2242->2243 2243->2249 2244 40208d 2246 40522e __locking 100 API calls 2244->2246 2245 40200d 2247 402024 2245->2247 2252 402041 2245->2252 2246->2249 2277 40522e 2247->2277 2249->1873 2250->2249 2253 401ff4 2250->2253 2256 401fff 2250->2256 2264 40534e 2250->2264 2252->2249 2302 404b4f 2252->2302 2253->2256 2274 40530a 2253->2274 2256->2244 2256->2245 2258 405575 2257->2258 2259 405558 2257->2259 2258->2238 2260 4022a5 __write_nolock 66 API calls 2259->2260 2261 40555d 2260->2261 2262 402246 __write_nolock 66 API calls 2261->2262 2263 40556d 2262->2263 2263->2238 2265 405365 2264->2265 2266 405357 2264->2266 2269 405390 2265->2269 2270 4022a5 __write_nolock 66 API calls 2265->2270 2267 4022a5 __write_nolock 66 API calls 2266->2267 2268 40535c 2267->2268 2268->2253 2269->2253 2271 405379 2270->2271 2272 402246 __write_nolock 66 API calls 2271->2272 2273 405389 2272->2273 2273->2253 2275 4061a9 __malloc_crt 66 API calls 2274->2275 2276 40531a 2275->2276 2276->2256 2278 40523a ___crtInitCritSecAndSpinCount 2277->2278 2279 405242 2278->2279 2280 40525d 2278->2280 2334 4022b8 2279->2334 2282 40526b 2280->2282 2286 4052ac 2280->2286 2284 4022b8 __write_nolock 66 API calls 2282->2284 2285 405270 2284->2285 2288 4022a5 __write_nolock 66 API calls 2285->2288 2337 407d2f 2286->2337 2287 4022a5 __write_nolock 66 API calls 2295 40524f ___crtInitCritSecAndSpinCount 2287->2295 2290 405277 2288->2290 2292 402246 __write_nolock 66 API calls 2290->2292 2291 4052b2 2293 4052d5 2291->2293 2294 4052bf 2291->2294 2292->2295 2297 4022a5 __write_nolock 66 API calls 2293->2297 2347 404c68 2294->2347 2295->2249 2299 4052da 2297->2299 2298 4052cd 2404 405300 2298->2404 2300 4022b8 __write_nolock 66 API calls 2299->2300 2300->2298 2303 404b5b ___crtInitCritSecAndSpinCount 2302->2303 2304 404b88 2303->2304 2305 404b6c 2303->2305 2306 404b96 2304->2306 2308 404bb7 2304->2308 2307 4022b8 __write_nolock 66 API calls 2305->2307 2309 4022b8 __write_nolock 66 API calls 2306->2309 2310 404b71 2307->2310 2313 404bd7 2308->2313 2314 404bfd 2308->2314 2312 404b9b 2309->2312 2311 4022a5 __write_nolock 66 API calls 2310->2311 2315 404b79 ___crtInitCritSecAndSpinCount 2311->2315 2317 4022a5 __write_nolock 66 API calls 2312->2317 2318 4022b8 __write_nolock 66 API calls 2313->2318 2316 407d2f __locking 67 API calls 2314->2316 2315->2249 2319 404c03 2316->2319 2320 404ba2 2317->2320 2321 404bdc 2318->2321 2323 404c10 2319->2323 2324 404c2c 2319->2324 2325 402246 __write_nolock 66 API calls 2320->2325 2322 4022a5 __write_nolock 66 API calls 2321->2322 2326 404be3 2322->2326 2327 404acc __lseeki64_nolock 68 API calls 2323->2327 2328 4022a5 __write_nolock 66 API calls 2324->2328 2325->2315 2329 402246 __write_nolock 66 API calls 2326->2329 2331 404c21 2327->2331 2330 404c31 2328->2330 2329->2315 2332 4022b8 __write_nolock 66 API calls 2330->2332 2500 404c5e 2331->2500 2332->2331 2335 402571 __write_nolock 66 API calls 2334->2335 2336 4022bd 2335->2336 2336->2287 2338 407d3b ___crtInitCritSecAndSpinCount 2337->2338 2339 407d96 2338->2339 2342 402bf4 __lock 66 API calls 2338->2342 2340 407db8 ___crtInitCritSecAndSpinCount 2339->2340 2341 407d9b EnterCriticalSection 2339->2341 2340->2291 2341->2340 2343 407d67 2342->2343 2344 407d7e 2343->2344 2346 403531 ___crtInitCritSecAndSpinCount 66 API calls 2343->2346 2407 407dc6 2344->2407 2346->2344 2348 404ca4 2347->2348 2378 404c9d 2347->2378 2349 404ca8 2348->2349 2350 404ccf 2348->2350 2351 4022b8 __write_nolock 66 API calls 2349->2351 2353 404d39 2350->2353 2354 404d13 2350->2354 2355 404cad 2351->2355 2358 404d4b 2353->2358 2411 404acc 2353->2411 2357 4022b8 __write_nolock 66 API calls 2354->2357 2359 4022a5 __write_nolock 66 API calls 2355->2359 2356 405226 2356->2298 2360 404d18 2357->2360 2363 40534e __write_nolock 66 API calls 2358->2363 2362 404cb4 2359->2362 2364 4022a5 __write_nolock 66 API calls 2360->2364 2365 402246 __write_nolock 66 API calls 2362->2365 2366 404d54 2363->2366 2368 404d21 2364->2368 2365->2378 2367 404f53 2366->2367 2421 4025e8 2366->2421 2370 404f61 2367->2370 2371 405186 WriteFile 2367->2371 2369 402246 __write_nolock 66 API calls 2368->2369 2369->2378 2374 405004 2370->2374 2379 404f73 2370->2379 2373 4051ad GetLastError 2371->2373 2383 404f4e 2371->2383 2373->2383 2387 40500e 2374->2387 2395 4050ab 2374->2395 2376 4051e7 2376->2378 2381 4022a5 __write_nolock 66 API calls 2376->2381 2377 404d93 2377->2367 2382 404da1 GetConsoleCP 2377->2382 2434 401a49 2378->2434 2379->2376 2380 404fbe WriteFile 2379->2380 2379->2383 2380->2373 2380->2379 2384 4051d4 2381->2384 2382->2383 2398 404dc1 2382->2398 2383->2376 2383->2378 2386 4051c7 2383->2386 2392 4022b8 __write_nolock 66 API calls 2384->2392 2385 405101 WideCharToMultiByte 2385->2373 2391 405134 WriteFile 2385->2391 2389 4051dc 2386->2389 2390 4051cf 2386->2390 2387->2376 2387->2383 2388 405061 WriteFile 2387->2388 2388->2373 2388->2387 2429 4022cb 2389->2429 2393 4022a5 __write_nolock 66 API calls 2390->2393 2394 405162 GetLastError 2391->2394 2391->2395 2392->2378 2393->2384 2394->2395 2395->2376 2395->2383 2395->2385 2395->2391 2398->2373 2398->2383 2399 40643e 78 API calls __write_nolock 2398->2399 2400 404e39 WideCharToMultiByte 2398->2400 2402 407df1 11 API calls __putwch_nolock 2398->2402 2403 404ea0 WriteFile 2398->2403 2426 40648b 2398->2426 2399->2398 2400->2383 2401 404e67 WriteFile 2400->2401 2401->2373 2401->2398 2402->2398 2403->2373 2403->2398 2499 407dcf LeaveCriticalSection 2404->2499 2406 405308 2406->2295 2410 402b1c LeaveCriticalSection 2407->2410 2409 407dcd 2409->2339 2410->2409 2442 407cbe 2411->2442 2413 404ae8 2414 404af0 2413->2414 2415 404b01 SetFilePointer 2413->2415 2416 4022a5 __write_nolock 66 API calls 2414->2416 2417 404b19 GetLastError 2415->2417 2418 404af5 2415->2418 2416->2418 2417->2418 2419 404b23 2417->2419 2418->2358 2420 4022cb __dosmaperr 66 API calls 2419->2420 2420->2418 2422 402571 __write_nolock 66 API calls 2421->2422 2423 4025ee 2422->2423 2424 4025fb GetConsoleMode 2423->2424 2425 4016e8 __amsg_exit 66 API calls 2423->2425 2424->2367 2424->2377 2425->2424 2456 406455 2426->2456 2430 4022b8 __write_nolock 66 API calls 2429->2430 2431 4022d1 __dosmaperr 2430->2431 2432 4022a5 __write_nolock 66 API calls 2431->2432 2433 4022e5 2432->2433 2433->2378 2435 401a51 2434->2435 2436 401a53 IsDebuggerPresent 2434->2436 2435->2356 2498 406535 2436->2498 2439 4037f3 SetUnhandledExceptionFilter UnhandledExceptionFilter 2440 403818 GetCurrentProcess TerminateProcess 2439->2440 2441 403810 __invoke_watson 2439->2441 2440->2356 2441->2440 2443 407cc7 2442->2443 2444 407cde 2442->2444 2445 4022b8 __write_nolock 66 API calls 2443->2445 2446 4022b8 __write_nolock 66 API calls 2444->2446 2448 407d2b 2444->2448 2447 407ccc 2445->2447 2449 407d0c 2446->2449 2450 4022a5 __write_nolock 66 API calls 2447->2450 2448->2413 2452 4022a5 __write_nolock 66 API calls 2449->2452 2451 407cd4 2450->2451 2451->2413 2453 407d13 2452->2453 2454 402246 __write_nolock 66 API calls 2453->2454 2455 407d23 2454->2455 2455->2413 2459 4020be 2456->2459 2460 40211a 2459->2460 2461 4020cd 2459->2461 2460->2398 2462 4025e8 __write_nolock 66 API calls 2461->2462 2463 4020d2 2462->2463 2465 4020fa 2463->2465 2467 405ec7 2463->2467 2465->2460 2482 405788 2465->2482 2468 405ed3 ___crtInitCritSecAndSpinCount 2467->2468 2469 4025e8 __write_nolock 66 API calls 2468->2469 2470 405ed8 2469->2470 2471 405f06 2470->2471 2472 405eea 2470->2472 2473 402bf4 __lock 66 API calls 2471->2473 2474 4025e8 __write_nolock 66 API calls 2472->2474 2475 405f0d 2473->2475 2479 405eef 2474->2479 2476 405e89 _LocaleUpdate::_LocaleUpdate 74 API calls 2475->2476 2477 405f20 2476->2477 2478 405f31 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 2477->2478 2478->2479 2480 4016e8 __amsg_exit 66 API calls 2479->2480 2481 405efd ___crtInitCritSecAndSpinCount 2479->2481 2480->2481 2481->2465 2483 405794 ___crtInitCritSecAndSpinCount 2482->2483 2484 4025e8 __write_nolock 66 API calls 2483->2484 2485 405799 2484->2485 2486 402bf4 __lock 66 API calls 2485->2486 2495 4057ab 2485->2495 2487 4057c9 2486->2487 2488 405812 2487->2488 2489 4057e0 InterlockedDecrement 2487->2489 2490 4057fa InterlockedIncrement 2487->2490 2491 405823 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 2488->2491 2489->2490 2494 4057eb 2489->2494 2490->2488 2491->2495 2492 4016e8 __amsg_exit 66 API calls 2493 4057b9 ___crtInitCritSecAndSpinCount 2492->2493 2493->2460 2494->2490 2496 40611b ___freetlocinfo 66 API calls 2494->2496 2495->2492 2495->2493 2497 4057f9 2496->2497 2497->2490 2498->2439 2499->2406 2503 407dcf LeaveCriticalSection 2500->2503 2502 404c66 2502->2315 2503->2502

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_00406540 42 Function_0040901A 0->42 1 Function_00402443 68 Function_004023CC 1->68 2 Function_00402A45 33 Function_00406900 2->33 98 Function_004028A5 2->98 3 Function_0040A645 4 Function_00402246 56 Function_00406535 4->56 4->68 5 Function_00408846 43 Function_0040611B 5->43 6 Function_00401A49 6->56 7 Function_0040214A 7->0 7->6 7->56 8 Function_0040554D 8->4 99 Function_004022A5 8->99 9 Function_0040134E 9->0 9->3 55 Function_0040A234 9->55 70 Function_004016CC 9->70 10 Function_0040534E 10->4 10->99 11 Function_00401B4E 11->4 19 Function_00401A58 11->19 11->99 12 Function_00404B4F 12->4 14 Function_00402F51 12->14 21 Function_00404C5E 12->21 38 Function_00402F0C 12->38 49 Function_00407D2F 12->49 69 Function_00404ACC 12->69 12->99 105 Function_004022B8 12->105 13 Function_00402E50 35 Function_00402E00 13->35 72 Function_00402DD0 13->72 15 Function_00401F54 58 Function_00404A38 15->58 16 Function_00406455 107 Function_004020BE 16->107 17 Function_00409A55 18 Function_00402355 78 Function_004022E9 18->78 19->4 22 Function_00401F5E 19->22 19->99 20 Function_0040795A 29 Function_00407575 20->29 63 Function_004074C5 20->63 71 Function_00407DCF 21->71 22->8 22->10 22->12 37 Function_0040530A 22->37 48 Function_0040522E 22->48 22->99 101 Function_004053AC 22->101 23 Function_00404C68 23->4 23->6 23->10 59 Function_0040643E 23->59 67 Function_004022CB 23->67 23->69 75 Function_004025E8 23->75 82 Function_00407DF1 23->82 93 Function_0040648B 23->93 23->99 23->105 24 Function_00402568 44 Function_00402B1C 24->44 25 Function_0040226A 26 Function_00402F70 26->6 26->13 41 Function_00406B16 26->41 50 Function_00406B30 26->50 73 Function_004091D5 26->73 74 Function_00406AE6 26->74 27 Function_00406171 27->44 28 Function_00402571 28->1 28->43 28->68 79 Function_004061E9 28->79 103 Function_004024B2 28->103 30 Function_00406777 30->4 30->99 31 Function_00405D77 32 Function_00403600 32->68 33->4 33->99 34 Function_00405300 34->71 36 Function_00407006 36->44 100 Function_004061A9 37->100 39 Function_0040170C 40 Function_0040700F 40->2 40->32 54 Function_00401732 40->54 60 Function_00406FC0 40->60 40->98 40->99 42->42 43->14 43->25 43->27 43->38 83 Function_00402BF4 43->83 87 Function_00407186 43->87 43->99 102 Function_004071B1 43->102 45 Function_00405823 45->44 46 Function_0040632B 46->16 46->99 46->107 47 Function_0040382C 48->4 48->14 48->23 48->34 48->38 48->49 48->99 48->105 49->14 49->38 51 Function_00403531 49->51 64 Function_00407DC6 49->64 49->83 85 Function_004069F4 50->85 51->7 51->14 51->18 51->38 51->68 94 Function_00401791 51->94 52 Function_00402B31 52->2 52->14 52->38 52->43 52->51 52->54 80 Function_00402BEB 52->80 52->83 52->98 52->99 52->100 53 Function_00405F31 53->44 54->39 57 Function_00405C37 57->5 57->43 89 Function_00408886 57->89 104 Function_004086B6 57->104 59->46 60->14 60->20 60->36 60->38 60->83 61 Function_00408FC3 62 Function_004023C3 62->18 64->44 65 Function_00405EC7 65->14 65->38 65->53 65->75 76 Function_004016E8 65->76 65->83 91 Function_00405E89 65->91 66 Function_004017C8 66->4 66->99 67->25 67->99 67->105 68->78 69->67 69->99 108 Function_00407CBE 69->108 70->11 75->28 75->76 76->2 76->68 76->98 77 Function_004067E8 77->4 77->99 78->66 96 Function_004036A0 78->96 92 Function_00408C8A 79->92 80->44 81 Function_004096F0 82->6 82->17 83->52 83->76 84 Function_004091F4 85->73 85->84 86 Function_00405DFD 88 Function_00408D86 88->44 89->43 90 Function_00405788 90->14 90->38 90->43 90->45 90->75 90->76 90->83 91->31 91->57 91->86 92->0 92->4 92->14 92->20 92->32 92->38 92->83 92->88 92->99 93->16 94->4 94->99 95 Function_0040689B 95->4 95->99 97 Function_004062A0 98->7 98->30 98->33 98->77 98->95 98->97 106 Function_004065BA 98->106 99->28 100->40 102->81 103->14 103->24 103->31 103->38 103->78 103->83 104->43 105->28 106->7 106->18 106->62 106->66 106->68 106->94 107->65 107->75 107->90 108->4 108->99 108->105

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog3_catch.LIBCMT ref: 00401370
                                                      • _memset.LIBCMT ref: 00401395
                                                      • _memset.LIBCMT ref: 004013AA
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 004013C6
                                                      • GetTempFileNameW.KERNELBASE(?,MSI,00000000,?), ref: 004013F1
                                                      • __CxxThrowException@8.LIBCMT ref: 0040140B
                                                      • FindResourceW.KERNEL32(?,DATA,MSI), ref: 00401417
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00401438
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00401459
                                                      • LockResource.KERNEL32(00000000), ref: 00401475
                                                      • CreateFileW.KERNELBASE(?,00120116,00000003,00000000,00000002,00000080,00000000), ref: 004014AD
                                                      • ShowWindow.USER32(00000005), ref: 004014EF
                                                      • WriteFile.KERNELBASE(?,?,00002000,?,00000000), ref: 0040150B
                                                      • InvalidateRect.USER32(00000000,00000001), ref: 00401540
                                                      • ShowWindow.USER32(00000000), ref: 00401551
                                                      • CloseHandle.KERNELBASE(?), ref: 00401556
                                                      • _swprintf.LIBCMT ref: 00401576
                                                      • _memset.LIBCMT ref: 00401585
                                                      • CreateProcessW.KERNELBASE ref: 004015C2
                                                      • ExitProcess.KERNEL32 ref: 004015C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: Resource$File_memset$CreateProcessShowTempWindow$CloseException@8ExitFindH_prolog3_catchHandleInvalidateLoadLockNamePathRectSizeofThrowWrite_swprintf
                                                      • String ID: %s /i %s$DATA$MSI$msiexec.exe
                                                      • API String ID: 595904572-4018923517
                                                      • Opcode ID: 6749e29da5631927e082cef264a39af6d613541d54a80a6319aa98c742fdb2b9
                                                      • Instruction ID: 20377c8c5a59a0e20dd786114ab2e7341586cf19af3ec8ffaaf84ee0be96f013
                                                      • Opcode Fuzzy Hash: 6749e29da5631927e082cef264a39af6d613541d54a80a6319aa98c742fdb2b9
                                                      • Instruction Fuzzy Hash: 49618B71900218EBDB20DFE5DD89EEE7AB8BB08704F20453AF505F61E1D7789A05CB69

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 93 4065ba-4065dc call 4023c3 96 406690-40669a 93->96 97 4065e2-4065f1 LoadLibraryA 93->97 100 406715-40671d 96->100 101 40669c-4066a2 96->101 98 406770 97->98 99 4065f7-406607 GetProcAddress 97->99 104 406772-406776 98->104 99->98 105 40660d-40664f call 402355 GetProcAddress call 402355 GetProcAddress call 402355 call 401791 99->105 102 406750-40675e call 4023cc 100->102 103 40671f-406728 call 4023cc 100->103 101->100 106 4066a4-4066bd call 4023cc * 2 101->106 102->98 116 406760-40676e 102->116 103->102 117 40672a-406731 103->117 133 406651-40665b call 40214a 105->133 134 40665e-406662 105->134 106->100 121 4066bf-4066c1 106->121 116->104 117->102 126 406733-40673b 117->126 121->100 125 4066c3-4066c7 121->125 135 4066e2-4066ee call 4017c8 125->135 136 4066c9-4066da 125->136 126->102 129 40673d-406746 call 4023cc 126->129 129->102 141 406748-40674d 129->141 133->134 134->96 139 406664-40667a GetProcAddress call 402355 134->139 149 4066f0-4066fa call 40214a 135->149 150 4066fd-406701 135->150 136->135 148 4066dc-4066e0 136->148 139->96 153 40667c-40668b GetProcAddress call 402355 139->153 141->102 148->100 148->135 149->150 151 406703-40670a 150->151 152 40670c-406713 150->152 151->102 152->102 153->96
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 004065E7
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00406603
                                                        • Part of subcall function 00402355: TlsGetValue.KERNEL32(00000000,004023CA,00000000,004065C8,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402362
                                                        • Part of subcall function 00402355: TlsGetValue.KERNEL32(00000004,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402379
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00406620
                                                        • Part of subcall function 00402355: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 0040238E
                                                        • Part of subcall function 00402355: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004023A9
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00406635
                                                      • __invoke_watson.LIBCMT ref: 00406656
                                                        • Part of subcall function 0040214A: _memset.LIBCMT ref: 004021D6
                                                        • Part of subcall function 0040214A: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 004021F4
                                                        • Part of subcall function 0040214A: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 004021FE
                                                        • Part of subcall function 0040214A: UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 00402208
                                                        • Part of subcall function 0040214A: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 00402223
                                                        • Part of subcall function 0040214A: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 0040222A
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000000,00402461), ref: 004023D9
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000004), ref: 004023F0
                                                        • Part of subcall function 004023CC: GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 00402405
                                                        • Part of subcall function 004023CC: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00402420
                                                      • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0040666A
                                                      • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00406682
                                                      • __invoke_watson.LIBCMT ref: 004066F5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate_memset
                                                      • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                      • API String ID: 2940365033-1046234306
                                                      • Opcode ID: f92e63f97473645d0ee2bbb4634820050cc61aa16b2c6853a90bedad70716cb5
                                                      • Instruction ID: 903c93859fa46a6f4ea376e20a98d8dd23118c8d58616714cf58463bdc1121ca
                                                      • Opcode Fuzzy Hash: f92e63f97473645d0ee2bbb4634820050cc61aa16b2c6853a90bedad70716cb5
                                                      • Instruction Fuzzy Hash: 8641B471900205EADF10AFB59D8596F7BA9AE44348B25093FE40AF32D0DBBC99508B6D

                                                      Control-flow Graph

                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 004037E1
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004037F6
                                                      • UnhandledExceptionFilter.KERNEL32(0040C8AC), ref: 00403801
                                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0040381D
                                                      • TerminateProcess.KERNEL32(00000000), ref: 00403824
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                      • String ID:
                                                      • API String ID: 2579439406-0
                                                      • Opcode ID: e1a142f2597a4008e7613153095846bbf84df19b1d486ef0f12ac1990e7fc7c8
                                                      • Instruction ID: 3151b91aa872a883dad0193dde7ea169f4a89536d61c20abba83bbf876892fdd
                                                      • Opcode Fuzzy Hash: e1a142f2597a4008e7613153095846bbf84df19b1d486ef0f12ac1990e7fc7c8
                                                      • Instruction Fuzzy Hash: 0B21CBB4941208EFD740DF68F9846843BA5FB98305F50913AE909A32A0E7B85AD18F5D

                                                      Control-flow Graph

                                                      APIs
                                                      • _strcpy_s.LIBCMT ref: 00402911
                                                      • __invoke_watson.LIBCMT ref: 00402922
                                                      • GetModuleFileNameA.KERNEL32(00000000,00410081,00000104,0040259A,00000001,00000214), ref: 0040293E
                                                      • _strcpy_s.LIBCMT ref: 00402953
                                                      • __invoke_watson.LIBCMT ref: 00402966
                                                      • _strlen.LIBCMT ref: 0040296F
                                                      • _strlen.LIBCMT ref: 0040297C
                                                      • __invoke_watson.LIBCMT ref: 004029A9
                                                      • _strcat_s.LIBCMT ref: 004029BC
                                                      • __invoke_watson.LIBCMT ref: 004029CD
                                                      • _strcat_s.LIBCMT ref: 004029DE
                                                      • __invoke_watson.LIBCMT ref: 004029EF
                                                      • GetStdHandle.KERNEL32(000000F4,00000001,00000001,00000000,76ED5E70,00000003,00402A71,000000FC,00407037,00000001,00000000,00000000,?,004061B6,0040259A,00000001), ref: 00402A0E
                                                      • _strlen.LIBCMT ref: 00402A2F
                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,004061B6,0040259A,00000001,00000001,00402B7E,00000018,0040E0A0,0000000C,00402C0D,00000001), ref: 00402A39
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 1879448924-4022980321
                                                      • Opcode ID: 409424b9660b85a0269d64acb115b1ad67300d71880ba7c06291fded9d5e2056
                                                      • Instruction ID: 93a8d7d5ea80ae4c3e828802d8d553a9b5e06a216e86f543143183862d938038
                                                      • Opcode Fuzzy Hash: 409424b9660b85a0269d64acb115b1ad67300d71880ba7c06291fded9d5e2056
                                                      • Instruction Fuzzy Hash: 9F3127B3A402007AE52132615E8EF6B364C9B15318F15023BFD0AB52D2EAFD8D5081BD

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040E058,0000000C,004025C3,00000000,00000000), ref: 004024C3
                                                      • GetProcAddress.KERNEL32(?,EncodePointer), ref: 004024F7
                                                      • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402507
                                                      • InterlockedIncrement.KERNEL32(0040F6F8), ref: 00402529
                                                      • __lock.LIBCMT ref: 00402531
                                                      • ___addlocaleref.LIBCMT ref: 00402550
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                      • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                      • API String ID: 1036688887-2843748187
                                                      • Opcode ID: 2274a066ac026ae925fe5652a49c290d3624d1abdb19e6b261c600bba24699d5
                                                      • Instruction ID: fbdbd79d6d8703cd58bfce1346c9629dc42ac9281775cfae9e4e5af3c7655ebc
                                                      • Opcode Fuzzy Hash: 2274a066ac026ae925fe5652a49c290d3624d1abdb19e6b261c600bba24699d5
                                                      • Instruction Fuzzy Hash: EA116070940701DED720AFBA9D49B5ABBF0AF00304F10467FA959B26D0CBB89504DF1C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 176 402355-402366 TlsGetValue 177 402368-402370 176->177 178 402389-402398 GetModuleHandleA 176->178 177->178 179 402372-40237f TlsGetValue 177->179 180 40239a-4023a1 call 4022e9 178->180 181 4023bd-4023c2 178->181 179->178 186 402381-402387 179->186 180->181 185 4023a3-4023a9 GetProcAddress 180->185 187 4023af-4023b1 185->187 186->187 187->181 188 4023b3-4023b9 187->188 188->181
                                                      APIs
                                                      • TlsGetValue.KERNEL32(00000000,004023CA,00000000,004065C8,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402362
                                                      • TlsGetValue.KERNEL32(00000004,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402379
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 0040238E
                                                      • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004023A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressHandleModuleProc
                                                      • String ID: EncodePointer$KERNEL32.DLL
                                                      • API String ID: 1929421221-3682587211
                                                      • Opcode ID: 2a42737889a403e7d8afdae4d2f3ffc8d2942cebba98d6740baa3c3f948ea94e
                                                      • Instruction ID: 54e1165a2b9932306059abba70c4f1523072c5380ccb0acef97fefcbe4b4d81e
                                                      • Opcode Fuzzy Hash: 2a42737889a403e7d8afdae4d2f3ffc8d2942cebba98d6740baa3c3f948ea94e
                                                      • Instruction Fuzzy Hash: 1AF01D30944213DBC7225BB5EE48A6B3AA49F417507144376ED18F6AF4DBBCCC41CA9D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 190 4023cc-4023dd TlsGetValue 191 402400-40240f GetModuleHandleA 190->191 192 4023df-4023e7 190->192 194 402411-402418 call 4022e9 191->194 195 402434-402439 191->195 192->191 193 4023e9-4023f6 TlsGetValue 192->193 193->191 199 4023f8-4023fe 193->199 194->195 200 40241a-402420 GetProcAddress 194->200 201 402426-402428 199->201 200->201 201->195 202 40242a-402430 201->202 202->195
                                                      APIs
                                                      • TlsGetValue.KERNEL32(00000000,00402461), ref: 004023D9
                                                      • TlsGetValue.KERNEL32(00000004), ref: 004023F0
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL), ref: 00402405
                                                      • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00402420
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressHandleModuleProc
                                                      • String ID: DecodePointer$KERNEL32.DLL
                                                      • API String ID: 1929421221-629428536
                                                      • Opcode ID: cafb124f787224b482a95b2ac3b4a91c0234f5a1e4f0cc787b7d164dfc720926
                                                      • Instruction ID: c78dc7a9585208a99074aea40c6bc01db638a5f6f1ffce41ee587fa2e8510638
                                                      • Opcode Fuzzy Hash: cafb124f787224b482a95b2ac3b4a91c0234f5a1e4f0cc787b7d164dfc720926
                                                      • Instruction Fuzzy Hash: 1EF09030905213DBC6255BB5EF88A6B3AA4AF013547148376F808F66F5CB78CC41CA9D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 214 40611b-40612c call 402f0c 217 4061a3-4061a8 call 402f51 214->217 218 40612e-406135 214->218 219 406137-40614f call 402bf4 call 407186 218->219 220 40617a 218->220 232 406151-406159 call 4071b1 219->232 233 40615a-40616a call 406171 219->233 224 40617b-40618b HeapFree 220->224 224->217 225 40618d-4061a2 call 4022a5 GetLastError call 40226a 224->225 225->217 232->233 233->217 239 40616c-40616f 233->239 239->224
                                                      APIs
                                                      • __lock.LIBCMT ref: 00406139
                                                        • Part of subcall function 00402BF4: __mtinitlocknum.LIBCMT ref: 00402C08
                                                        • Part of subcall function 00402BF4: __amsg_exit.LIBCMT ref: 00402C14
                                                        • Part of subcall function 00402BF4: EnterCriticalSection.KERNEL32(0040258B,0040258B,?,00408D0B,00000004,0040E328,0000000C,004061FC,00000000,00000000,00000000,00000000,00000000,0040259A,00000001,00000214), ref: 00402C1C
                                                      • ___sbh_find_block.LIBCMT ref: 00406144
                                                      • ___sbh_free_block.LIBCMT ref: 00406153
                                                      • HeapFree.KERNEL32(00000000,00000001,0040E260,0000000C,00402BD5,00000000,0040E0A0,0000000C,00402C0D,00000001,0040258B,?,00408D0B,00000004,0040E328,0000000C), ref: 00406183
                                                      • GetLastError.KERNEL32(?,00408D0B,00000004,0040E328,0000000C,004061FC,00000000,00000000,00000000,00000000,00000000,0040259A,00000001,00000214), ref: 00406194
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 2714421763-0
                                                      • Opcode ID: ec309f13ac6ed2460b9bc622685fdac9bcbdfdb6d37f39f168fb5652b14ded11
                                                      • Instruction ID: 2a96ef66e3485db1b055fe51310aebddc08bfb44f5d3ca0f1bd79134f6b4c0cc
                                                      • Opcode Fuzzy Hash: ec309f13ac6ed2460b9bc622685fdac9bcbdfdb6d37f39f168fb5652b14ded11
                                                      • Instruction Fuzzy Hash: D5018F31945202EAEF206FB29D0AB4E3774AF00769F11423FF505BA2C2CA7C95519A5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 240 40632b-40633a 241 40633c-40633f 240->241 242 40634f 240->242 241->242 244 406341-406343 241->244 243 406351-406354 242->243 245 406355-406366 call 4020be 244->245 246 406345-40634a 244->246 250 406387-406398 call 406455 245->250 251 406368-40636d 245->251 246->242 247 40634c 246->247 247->242 258 406417-406436 MultiByteToWideChar 250->258 259 40639a-4063a6 250->259 252 406376-406379 251->252 253 40636f-406373 251->253 255 406382-406385 252->255 256 40637b-40637e 252->256 253->252 255->243 256->255 258->252 260 40643c 258->260 261 4063a8-4063ab 259->261 262 4063cd-4063d6 259->262 264 4063f8-406406 call 4022a5 260->264 261->262 263 4063ad-4063cb MultiByteToWideChar 261->263 262->264 265 4063d8-4063db 262->265 263->262 266 4063dd-4063e6 263->266 270 406408-40640b 264->270 271 40640f-406412 264->271 265->264 265->266 266->243 268 4063ec-4063f3 266->268 268->243 270->271 271->243
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040635B
                                                      • __isleadbyte_l.LIBCMT ref: 0040638F
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?), ref: 004063C0
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?), ref: 0040642E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 3d6466147ee63cab85e1936a5fef035c853123870c94230fcfdac984927a4de7
                                                      • Instruction ID: 7491b92a4c32cea02cca1e18898105e8535631cd0ddae29ab752054e9d357e5d
                                                      • Opcode Fuzzy Hash: 3d6466147ee63cab85e1936a5fef035c853123870c94230fcfdac984927a4de7
                                                      • Instruction Fuzzy Hash: 7131E230500245EFDB20DFA4C880AAE7BB5FF01310F1A817AE866AB2D1D734DD60DB99

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 272 405788-4057a3 call 402f0c call 4025e8 277 4057c2-4057da call 402bf4 272->277 278 4057a5-4057a9 272->278 283 405812-40581e call 405823 277->283 284 4057dc-4057de 277->284 278->277 280 4057ab 278->280 282 4057ae-4057b0 280->282 285 4057b2-4057b9 call 4016e8 282->285 286 4057ba-4057c1 call 402f51 282->286 283->282 287 4057e0-4057e9 InterlockedDecrement 284->287 288 4057fa-40580c InterlockedIncrement 284->288 285->286 287->288 292 4057eb-4057f1 287->292 288->283 292->288 296 4057f3-4057f9 call 40611b 292->296 296->288
                                                      APIs
                                                        • Part of subcall function 004025E8: __amsg_exit.LIBCMT ref: 004025F6
                                                      • __amsg_exit.LIBCMT ref: 004057B4
                                                      • __lock.LIBCMT ref: 004057C4
                                                      • InterlockedDecrement.KERNEL32(?), ref: 004057E1
                                                      • InterlockedIncrement.KERNEL32(00D32BF8), ref: 0040580C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                                      • String ID:
                                                      • API String ID: 4129207761-0
                                                      • Opcode ID: 92750075eb3ef2bf1ee2714700a2e6cd28c9732acaf63113e8133cc47fa9dec7
                                                      • Instruction ID: 4349d519936afe56ffc5c276bbf6f90d14a5f85baeece521cae09b1fc0886954
                                                      • Opcode Fuzzy Hash: 92750075eb3ef2bf1ee2714700a2e6cd28c9732acaf63113e8133cc47fa9dec7
                                                      • Instruction Fuzzy Hash: 67017936901A12DBD620BBA6994A74B77B0BB04714F04413BE805B76D1CB3CA841EF9D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 299 402571-40258c GetLastError call 402443 303 4025dc-4025e7 SetLastError 299->303 304 40258e-402593 299->304 305 402595 call 4061e9 304->305 306 40259a-4025a0 305->306 306->303 307 4025a2-4025a9 306->307 308 4025af call 4023cc 307->308 309 4025b4-4025b9 308->309 311 4025d3-4025da call 40611b 309->311 312 4025bb-4025bd 309->312 311->303 313 4025be call 4024b2 312->313 315 4025c3-4025d1 GetCurrentThreadId 313->315 315->303
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000,004022AA,00401B88,00000000,00000000,?,004016E4,?,?,?,00000000,00000208,0040157B,?,00000208), ref: 00402573
                                                        • Part of subcall function 00402443: TlsGetValue.KERNEL32(00000000,00402586), ref: 0040244A
                                                        • Part of subcall function 00402443: TlsSetValue.KERNEL32(00000000), ref: 0040246B
                                                      • __calloc_crt.LIBCMT ref: 00402595
                                                        • Part of subcall function 004061E9: __calloc_impl.LIBCMT ref: 004061F7
                                                        • Part of subcall function 004061E9: Sleep.KERNEL32(00000000,0040259A,00000001,00000214), ref: 0040620E
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000000,00402461), ref: 004023D9
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000004), ref: 004023F0
                                                        • Part of subcall function 004024B2: GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040E058,0000000C,004025C3,00000000,00000000), ref: 004024C3
                                                        • Part of subcall function 004024B2: GetProcAddress.KERNEL32(?,EncodePointer), ref: 004024F7
                                                        • Part of subcall function 004024B2: GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402507
                                                        • Part of subcall function 004024B2: InterlockedIncrement.KERNEL32(0040F6F8), ref: 00402529
                                                        • Part of subcall function 004024B2: __lock.LIBCMT ref: 00402531
                                                        • Part of subcall function 004024B2: ___addlocaleref.LIBCMT ref: 00402550
                                                      • GetCurrentThreadId.KERNEL32 ref: 004025C5
                                                      • SetLastError.KERNEL32(00000000), ref: 004025DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1707141423.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1707124625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707159750.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707176336.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1707192629.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_thunderbird-to-outlook-converter.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                                      • String ID:
                                                      • API String ID: 1081334783-0
                                                      • Opcode ID: 4b477ac62d0d8da954439966bd98dbafc4556b3d36004d3aa4a932d628616111
                                                      • Instruction ID: c34bda9c1bb9a39f5e0c4412eb6bf616bca4bee9ab0c0707fc9fbb88643eb821
                                                      • Opcode Fuzzy Hash: 4b477ac62d0d8da954439966bd98dbafc4556b3d36004d3aa4a932d628616111
                                                      • Instruction Fuzzy Hash: CDF02832104622EAC2313BB57E0E64B3E518F00771710023FF504BA5E2CEB8C981CA9D